Sciweavers

269 search results - page 21 / 54
» Comparison of Scenario-Based Software Architecture Evaluatio...
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 7 months ago
Parallel Hardware Architectures for the Cryptographic Tate Pairing
Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...
ICSM
2009
IEEE
14 years 2 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
ENTCS
2007
101views more  ENTCS 2007»
13 years 7 months ago
Parametric Performance Contracts: Non-Markovian Loop Modelling and an Experimental Evaluation
Even with todays hardware improvements, performance problems are still common in many software systems. An approach to tackle this problem for component-based software architectur...
Heiko Koziolek, Viktoria Firus
IEE
2008
116views more  IEE 2008»
13 years 7 months ago
Evaluating formal properties of feature diagram languages
: Feature diagrams (FDs) are a family of popular modelling languages, mainly used for managing variability in software product lines. FDs were first introduced by Kang et al. as pa...
Patrick Heymans, Pierre-Yves Schobbens, Jean-Chris...
ICWS
2010
IEEE
13 years 6 months ago
Evaluating the Survivability of SOA Systems Based on HMM
Survivability is a crucial property for computer systems that support critical infrastructures of our society. A variety of survivability definitions and evaluation methods for t...
Leilei Chen, Qing Wang, Wei Xu, Liang Zhang