Sciweavers

2442 search results - page 125 / 489
» Secure Service Orchestration
Sort
View
IPCCC
2006
IEEE
14 years 2 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
ICSE
2005
IEEE-ACM
14 years 8 months ago
Towards aspect weaving applications
Software must be adapted to accommodate new features in the context of changing requirements. In this paper, we illustrate how applications with aspect weaving capabilities can be...
Carine Courbis, Anthony Finkelstein
ECBS
2008
IEEE
140views Hardware» more  ECBS 2008»
14 years 2 months ago
Towards Performance Related Decision Support for Model Driven Engineering of Enterprise SOA Applications
Model Driven Performance Engineering (MDPE) enables early performance feedback in a MDE process, in order to avoid late identification of performance problems which could cause si...
Mathias Fritzsche, Wasif Gilani, Ivor T. A. Spence...
HICSS
2008
IEEE
135views Biometrics» more  HICSS 2008»
14 years 2 months ago
Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation
While executing a process, many decisions are taken at its various decision points for selecting paths. There is a need for understanding and analyzing on various paths that emana...
Sinnakkrishnan Perumal, Ambuj Mahanti
ICDE
2007
IEEE
166views Database» more  ICDE 2007»
14 years 2 months ago
Enforcing Context-Sensitive Policies in Collaborative Business Environments
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose...
Alberto Sardinha, Jinghai Rao, Norman M. Sadeh