Sciweavers

80 search results - page 13 / 16
» Refactoring a Legacy System Using Components
Sort
View
TSC
2010
133views more  TSC 2010»
13 years 5 months ago
Semantic-Based Mashup of Composite Applications
—The need for integration of all types of client and server applications that were not initially designed to interoperate is gaining popularity. One of the reasons for this popul...
Anne H. H. Ngu, Michael Pierre Carlson, Quan Z. Sh...
CCS
2009
ACM
14 years 2 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
TES
2004
Springer
14 years 24 days ago
From Web Service Composition to Megaprogramming
Abstract. With the emergence of Web service technologies, it has become possible to use high level megaprogramming models and visual tools to easily build distributed systems using...
Cesare Pautasso, Gustavo Alonso
ACSAC
2004
IEEE
13 years 11 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
WORDS
2005
IEEE
14 years 1 months ago
A Framework for Middleware Supporting Real-Time Wide-Area Distributed Computing
: The development of real-time systems that are distributed over a wide area is a significant problem that has challenged researchers for many years. Such systems require precise t...
K. H. (Kane) Kim, Stephen F. Jenks, Larry Smarr, A...