Sciweavers

3686 search results - page 65 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
SE
2008
13 years 10 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz
IDEAS
1999
IEEE
144views Database» more  IDEAS 1999»
14 years 1 months ago
The Scalability of an Object Descriptor Architecture OODBMS
An object database management system (OODBMS) has been often criticized for its alleged insufficient scalability for a large-scale production system. We investigated the scalabili...
Kwok K. Yu, Byung Suk Lee, Michael R. Olson
WETICE
2008
IEEE
14 years 3 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...
ISSTA
2006
ACM
14 years 3 months ago
Towards an architectural approach for the dynamic and automatic composition of software components
In a component-based software system the components are specified, designed and implemented with the intention to be reused, and are assembled in various contexts in order to pro...
Antonio Bucchiarone, Andrea Polini, Patrizio Pelli...
ICPADS
2008
IEEE
14 years 3 months ago
Quality of Service for Peer-to-Peer Based Networked Virtual Environments
This paper describes how Quality of Service (QoS) enabled Overlay Multicast architectures using Peer-to-Peer (P2P) networks can enhance the experience of end-users in Networked Vi...
Marc Brogle, Dragan Milic, Torsten Braun