Sciweavers

2056 search results - page 320 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
COMSWARE
2006
IEEE
14 years 3 months ago
Trust-propagation based authentication protocol in multihop wireless home networks
Abstract— In this paper, we propose an authentication and secure channel establishment protocol that is reliable and adaptable for multihop wireless home networks. The main idea ...
Han Sang Kim, Jin Wook Lee, Sandeep K. S. Gupta, Y...
ICSE
2007
IEEE-ACM
14 years 9 months ago
The Role of Experience and Ability in Comprehension Tasks Supported by UML Stereotypes
Proponents of design notations tailored for specific application domains or reference architectures, often available in the form of UML stereotypes, motivate them by improved unde...
Filippo Ricca, Massimiliano Di Penta, Marco Torchi...
AOSD
2003
ACM
14 years 2 months ago
Model-view-controller and object teams: a perfect match of paradigms
From the early days of object-oriented programming, the model-view-controller paradigm has been pursued for a clear design which separates different responsibilities within an in...
Matthias Veit, Stephan Herrmann
AOSD
2003
ACM
14 years 2 months ago
Persistence as an aspect
Persistence - the storage and retrieval of application data from secondary storage media - is often used as a classical example of a crosscutting concern. It is widely assumed tha...
Awais Rashid, Ruzanna Chitchyan
WWW
2004
ACM
14 years 9 months ago
Site-to-site (s2s) searching using the p2p framework with cgi
Peer-To-Peer (P2P) networks like Gnutella improve some shortcomings of Conventional Search Engines (CSE) such as centralized and outdated indexing by distributing the search engin...
Wan Yeung Wong