Sciweavers

1606 search results - page 274 / 322
» Methodological Approach for Developing a KMS: A Case Study
Sort
View
MOMPES
2009
IEEE
14 years 4 months ago
Reliable operating modes for distributed embedded systems
Hard real-time embedded distributed systems pose huge demands in their implementation which must contain as few faults as possible. Over the past years, model-driven development a...
Wolfgang Haberl, Stefan Kugele, Uwe Baumgarten
SEKE
2009
Springer
14 years 4 months ago
Bridging Semantic Gaps Between Stakeholders in the Production Automation Domain with Ontology Areas
Abstract—Stakeholders from several domains with local terminologies have to work together to develop and operate softwareintensive systems, like production automation systems. On...
Stefan Biffl, Wikan Danar Sunindyo, Thomas Moser
APSEC
2008
IEEE
14 years 4 months ago
Towards Unanticipated Runtime Adaptation of Java Applications
Modifying an application usually means to stop the application, apply the changes, and start the application again. That means, the application is not available for at least a sho...
Mario Pukall, Christian Kästner, Gunter Saake
DSN
2008
IEEE
14 years 4 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
WCRE
2008
IEEE
14 years 4 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou