Sciweavers

841 search results - page 94 / 169
» Data Encapsulation in Software Components
Sort
View
DEXAW
2004
IEEE
166views Database» more  DEXAW 2004»
14 years 1 months ago
Development of Flexible Peer-To-Peer Information Systems Using Adaptable Mobile Agents
Wide-area networks provide an easy access to many different distributed and heterogeneous data sources. The development of automated operating tools is still complex, particularly...
Jean-Paul Arcangeli, Sebastien Leriche, Marc Pante...
COMPSAC
1997
IEEE
14 years 2 months ago
Classifying Architectural Elements as a Foundation for Mechanism Matching
Building a system at the architectural level can be thought of as decomposition into components followed by a series of exercises in matching. Components must be composed with eac...
Rick Kazman, Paul C. Clements, Leonard J. Bass, Gr...
IFIP11
2004
114views Business» more  IFIP11 2004»
13 years 11 months ago
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications
: Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, an...
Andrew M. Colarik, Clark D. Thomborson, Lech J. Ja...
CCECE
2006
IEEE
14 years 4 months ago
Hardware Edge Detection using an Altera Stratix NIOS2 Development Kit
— Edge detection is a computer vision algorithm that is very processor intensive. It is possible to increase the speed of the algorithm by using hardware parallelism. This paper ...
Jay Kraut
IFIP
2010
Springer
13 years 4 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...