Sciweavers

2056 search results - page 353 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
SIGSOFT
1998
ACM
13 years 12 months ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin
APL
1993
ACM
13 years 11 months ago
The Role of APL and J in High-Performance Computation
Although multicomputers are becoming feasible for solving large problems, they are difficult to program: Extraction of parallelism from scalar languages is possible, but limited....
Robert Bernecky
EUROMICRO
2004
IEEE
13 years 11 months ago
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks
The class of wireless and mobile networks features a dissimilar set of characteristics and constraints compared to traditional fixed networks. The various dimensions of these char...
Matthias Hollick, Ivan Martinovic, Tronje Krop, Iv...
COMSWARE
2008
IEEE
13 years 9 months ago
Density-first Ad-hoc routing protocol for MANET
In recent years, Mobile Ad-hoc Networks (MANETs) have received tremendous attention because of their self-configuration and self-maintenance capabilities. With open network archite...
Jiong Wang, Sirisha Medidi
IIWAS
2008
13 years 9 months ago
Using conditional transformations for semantic user interface adaptation
The rapid growth of mobile Internet use requires highly flexible and adaptable user interfaces for web applications. Contextual data from various sources as for example device HMI...
Pascal Bihler, Merlin Fotsing, Günter Kniesel...