Sciweavers

690 search results - page 99 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
JSS
2007
169views more  JSS 2007»
15 years 3 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton
139
Voted
MDM
2009
Springer
15 years 8 months ago
WINFO+: Identification of Environment Condition Using Walking Signals
—In this paper we describe a prototype system of identifying environment condition utilizing signals emitted by people. Many people move around in many places such as urban and m...
Yasuyuki Ishida, Niwat Thepvilojanapong, Yoshito T...
CSMR
2004
IEEE
15 years 7 months ago
Tool Support for Traceable Product Evolution
In software product families, the full benefit of reuse can only be achieved if traceability of requirements to architecture, components and further down to source code is support...
Patricia Lago, Eila Niemelä, Hans van Vliet
DRM
2007
Springer
15 years 10 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
ANCS
2006
ACM
15 years 7 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo