Sciweavers

2056 search results - page 305 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
ICSE
2012
IEEE-ACM
11 years 11 months ago
What make long term contributors: Willingness and opportunity in OSS community
—To survive and succeed, software projects need to attract and retain contributors. We model the individual’s chances to become a valuable contributor through her capacity, wil...
Minghui Zhou, Audris Mockus
WWW
2008
ACM
14 years 9 months ago
Non-intrusive monitoring and service adaptation for WS-BPEL
Web service processes currently lack monitoring and dynamic (runtime) adaptation mechanisms. In highly dynamic processes, services frequently need to be exchanged due to a variety...
Oliver Moser, Florian Rosenberg, Schahram Dustdar
ICSE
2004
IEEE-ACM
14 years 9 months ago
Architecting and Implementing Versatile Dependability
Distributed applications must often consider and select the appropriate trade-offs among three important aspects ? fault-tolerance, performance and resources. We introduce a novel ...
Tudor Dumitras, Deepti Srivastava, Priya Narasimha...
CODES
2005
IEEE
14 years 2 months ago
Satisfying real-time constraints with custom instructions
Instruction-set extensible processors allow an existing processor core to be extended with application-specific custom instructions. In this paper, we explore a novel application...
Pan Yu, Tulika Mitra
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
14 years 2 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu