Sciweavers

8503 search results - page 1453 / 1701
» Secure Software Architectures
Sort
View
ICSE
2009
IEEE-ACM
13 years 8 months ago
Architecture-driven self-adaptation and self-management in robotics systems
We describe an architecture-centric design and implementation approach for building self-adapting and selfmanaging robotics systems. The basis of our approach is the concept of me...
George Edwards, Joshua Garcia, Hossein Tajalli, Da...
CCR
2011
13 years 5 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
CSMR
2010
IEEE
13 years 5 months ago
Reverse Engineering Component Models for Quality Predictions
Legacy applications are still widely spread. If a need to change deployment or update its functionality arises, it becomes difficult to estimate the performance impact of such modi...
Steffen Becker, Michael Hauck, Mircea Trifu, Klaus...
VLSI
2010
Springer
13 years 5 months ago
A design workflow for dynamically reconfigurable multi-FPGA systems
Multi-FPGA systems (MFS's) represent a promising technology for various applications, such as the implementation of supercomputers and parallel and computational intensive emu...
Alessandro Panella, Marco D. Santambrogio, Frances...
ICST
2011
IEEE
13 years 2 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
« Prev « First page 1453 / 1701 Last » Next »