Sciweavers

8503 search results - page 1463 / 1701
» Secure Software Architectures
Sort
View
SAC
2010
ACM
13 years 8 months ago
A formal approach to reuse successful traceability practices in SPL projects
Software Product Line (SPL) Engineering has to deal with interrelated, complex models such as feature and architecture models, hence traceability is fundamental to keep them consi...
Angelina Espinoza, Goetz Botterweck, Juan Garbajos...
SAC
2010
ACM
13 years 5 months ago
Inter-DSL coordination support by combining megamodeling and model weaving
Model-Driven Engineering (MDE) advocates the use of models at every step of the software development process. Within this context, a team of engineers collectively and collaborati...
Frédéric Jouault, Bert Vanhooff, Hug...
EMSOFT
2011
Springer
12 years 10 months ago
Aciom: application characteristics-aware disk and network i/o management on android platform
The last several years have seen a rapid increase in smart phone use. Android offers an open-source software platform on smart phones, that includes a Linux-based kernel, Java app...
Hyosu Kim, Minsub Lee, Wookhyun Han, Kilho Lee, In...
SAC
2010
ACM
14 years 5 months ago
A robust link-translating proxy server mirroring the whole web
Link-translating proxies are widely used for anonymous browsing, policy circumvention and WebVPN functions. These are implemented by encoding the destination URL in the path of th...
Ziqing Mao, Cormac Herley
IPPS
2009
IEEE
14 years 5 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...
« Prev « First page 1463 / 1701 Last » Next »