Sciweavers

6106 search results - page 194 / 1222
» Modes for Software Architectures
Sort
View
P2P
2002
IEEE
14 years 2 months ago
Dependability Properties of P2P Architectures
There is an increasing interest in using P2P as a basis for software systems. However, by their very nature, achieving dependability within a P2P system can be difficult. This pap...
James Walkerdine, Lee Melville, Ian Sommerville
IJISEC
2006
106views more  IJISEC 2006»
13 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
CSMR
2009
IEEE
14 years 1 months ago
Transferring Software to a New Framework in a Brownfield Environment
This is an experience report on the architectural reengineering of a large software portfolio. In order to minimize the risks of such an undertaking, companies tend to be conserva...
Pieter van der Spek, Steven Klusener
CSREASAM
2007
13 years 10 months ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham