The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
To apply the component-based approach to distributed real-time software development, it is necessary to identify components based on both functional and real-time requirements. Si...
Commercial-off-the-shelf components (COTS) are widely reused at present and black-box composition is the unique way to integrate them into the target system. However, various mism...
Middleware for smart items can facilitate the coordinated execution of distributed components for early data processing. These components can be deployed to different nodes in the...
In this paper, we address the pre-image problem in kernel principal component analysis (KPCA). The preimage problem finds a pattern as the pre-image of a feature vector defined in...