Sciweavers

1272 search results - page 57 / 255
» Managing variability in software architectures
Sort
View
MOBISYS
2004
ACM
16 years 3 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
DSOM
2003
Springer
15 years 9 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
EUROMICRO
1999
IEEE
15 years 8 months ago
Enhancing Security in the Memory Management Unit
We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software pri...
Tanguy Gilmont, Jean-Didier Legat, Jean-Jacques Qu...
EWSA
2005
Springer
15 years 9 months ago
Managing Dynamic Reconfiguration in Component-Based Systems
We propose a meta-framework called ‘Plastik’ which i) supports the specification and creation of runtime component-framework-based software systems and ii) facilitates and mana...
Thaís Vasconcelos Batista, Ackbar Joolia, G...
ECOOPW
2006
Springer
15 years 7 months ago
Architecture-Centric Evolution: New Issues and Trends
Abstract. Software evolution has largely been focused on low-level implementation artefacts through refactoring techniques rather than the architectural level. However code-centric...
Paris Avgeriou, Uwe Zdun, Isabelle Borne