Sciweavers

248 search results - page 20 / 50
» Reflecting on self-adaptive software systems
Sort
View
130
Voted
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 3 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
137
Voted
JSS
2006
65views more  JSS 2006»
15 years 3 months ago
Patterns of conflict among software components
Integrating a system of disparate components to form a single application is still a daunting, high risk task, especially for components with heterogeneous communication expectati...
Michelle Hepner, Rose F. Gamble, Manasi Kelkar, Le...
132
Voted
HICSS
2007
IEEE
120views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Model-Based Approach for Platform-Independent Binary Components with Precise Timing and Fine-Grained Concurrency
Fine grained concurrency and accurate timing can be essential for embedded hardware and software systems. These requirements should be reflected in the specification and must be c...
Tim Schattkowsky, Gregor Engels, Alexander Fö...
111
Voted
IWPC
1996
IEEE
15 years 7 months ago
The Gadfly: An Approach to Architectural-Level System Comprehension
Technology to support system comprehension tends to reflect either a "bottom-up" or "top-down" approach. Bottom-up approaches attempt to derive system models f...
Kurt C. Wallnau, Paul C. Clements, Edwin J. Morris...
112
Voted
CISIS
2010
IEEE
15 years 10 months ago
Translational Research and Context in Health Monitoring Systems
Context has been applied to a broad range of domains and systems ranging from location-based tourist applications to motion capture. An area relatively under-represented in the li...
Robert Ashford, Philip Moore, Bin Hu, Mike Jackson...