Sciweavers

6106 search results - page 194 / 1222
» Modes for Software Architectures
Sort
View
P2P
2002
IEEE
15 years 8 months ago
Dependability Properties of P2P Architectures
There is an increasing interest in using P2P as a basis for software systems. However, by their very nature, achieving dependability within a P2P system can be difficult. This pap...
James Walkerdine, Lee Melville, Ian Sommerville
127
Voted
IJISEC
2006
106views more  IJISEC 2006»
15 years 3 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
112
Voted
CSMR
2009
IEEE
15 years 7 months ago
Transferring Software to a New Framework in a Brownfield Environment
This is an experience report on the architectural reengineering of a large software portfolio. In order to minimize the risks of such an undertaking, companies tend to be conserva...
Pieter van der Spek, Steven Klusener
114
Voted
CSREASAM
2007
15 years 5 months ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham
83
Voted
CASES
2009
ACM
15 years 10 months ago
OPAIMS: open architecture precision agriculture information monitoring system
Yuexuan Wang, Yongcai Wang, Xiao Qi, Liwen Xu