Sciweavers

248 search results - page 20 / 50
» Reflecting on self-adaptive software systems
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 7 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
JSS
2006
65views more  JSS 2006»
13 years 7 months ago
Patterns of conflict among software components
Integrating a system of disparate components to form a single application is still a daunting, high risk task, especially for components with heterogeneous communication expectati...
Michelle Hepner, Rose F. Gamble, Manasi Kelkar, Le...
HICSS
2007
IEEE
120views Biometrics» more  HICSS 2007»
14 years 1 months ago
A Model-Based Approach for Platform-Independent Binary Components with Precise Timing and Fine-Grained Concurrency
Fine grained concurrency and accurate timing can be essential for embedded hardware and software systems. These requirements should be reflected in the specification and must be c...
Tim Schattkowsky, Gregor Engels, Alexander Fö...
IWPC
1996
IEEE
13 years 11 months ago
The Gadfly: An Approach to Architectural-Level System Comprehension
Technology to support system comprehension tends to reflect either a "bottom-up" or "top-down" approach. Bottom-up approaches attempt to derive system models f...
Kurt C. Wallnau, Paul C. Clements, Edwin J. Morris...
CISIS
2010
IEEE
14 years 2 months ago
Translational Research and Context in Health Monitoring Systems
Context has been applied to a broad range of domains and systems ranging from location-based tourist applications to motion capture. An area relatively under-represented in the li...
Robert Ashford, Philip Moore, Bin Hu, Mike Jackson...