Sciweavers

1177 search results - page 130 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
ICSE
1998
IEEE-ACM
14 years 1 months ago
Non-Intrusive Object Introspection in C++: Architecture and Application
We describe the design and implementation of system architecture to support object introspection in C++. In this system, information is collected by parsing class declarations, an...
Tyng-Ruey Chuang, Y. S. Kuo, Chien-Min Wang
ACMACE
2005
ACM
13 years 11 months ago
AI middleware as means for improving gameplay
Current commercial AI middleware are still far from being a generic and flexible tool for developing computer games. Also the literature lacks proposals in this field. In this w...
Börje Karlsson, Bruno Feijó
WSC
2000
13 years 10 months ago
A simulation test-bed to evaluate multi-agent control of manufacturing systems
Current research in the area of manufacturing planning and control has moved away from traditional centralized solutions towards distributed architectures that range from hierarch...
Robert W. Brennan, William O
CODES
2002
IEEE
14 years 1 months ago
Dynamic run-time HW/SW scheduling techniques for reconfigurable architectures
Dynamic run-time scheduling in System-on-Chip platforms has become recently an active area of research because of the performance and power requirements of new applications. Moreo...
Juanjo Noguera, Rosa M. Badia