Sciweavers

2131 search results - page 379 / 427
» Multi-Agent System Development: Design, Runtime, and Analysi...
Sort
View
IWSEC
2009
Springer
14 years 3 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
GLOBECOM
2008
IEEE
14 years 3 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
ICSM
2008
IEEE
14 years 3 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
SAC
2006
ACM
14 years 3 months ago
Building the functional performance model of a processor
In this paper, we present an efficient procedure for building a piecewise linear function approximation of the speed function of a processor with hierarchical memory structure. Th...
Alexey L. Lastovetsky, Ravi Reddy, Robert Higgins
AOSD
2005
ACM
14 years 2 months ago
Towards just-in-time middleware architectures
Middleware becomes increasingly important in building distributed applications. Conventional middleware systems are designed, implemented, and packaged before applications are dev...
Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen