Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
The second ACES-MB workshop brought together researchers and practitioners interested in model-based software engineering for realtime embedded systems, with a particular focus on ...
Stefan Van Baelen, Thomas Weigert, Ileana Ober, Hu...
Failures during web service execution may depend on a wide variety of causes, such as network faults, server crashes, or application-related errors, such as unavailability of a re...
Olga Nabuco, Riadh Ben Halima, Khalil Drira, Maria...
In this paper we describe a framework for robust system maintenance that addresses specific challenges of data-centric applications. We show that for data-centric applications, cl...
Behzad Bordbar, Dirk Draheim, Matthias Horn, Ina S...
Abstract. The OMG’s Model-Driven Architecture focusses on the evolution and integration of applications across heterogeneous middleware platforms. Presently available instances o...