Sciweavers

2056 search results - page 43 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
WOSP
2000
ACM
14 years 1 months ago
How system architectures impede interoperability
Interoperability problems arise when complex software systems are constructed by integrating distinct, and often heterogeneous, components. By performing interoperability analysis...
Leigh A. Davis, Jamie Payton, Rose F. Gamble
CISIS
2009
IEEE
14 years 3 months ago
Designing Regular Network-on-Chip Topologies under Technology, Architecture and Software Constraints
—Regular multi-core processors are appearing in the embedded system market as high performance software programmable solutions. The use of regular interconnect fabrics for them a...
Francisco Gilabert Villamón, Daniele Ludovi...
ICSE
2005
IEEE-ACM
14 years 8 months ago
Tool support for just-in-time architecture reconstruction and evaluation: an experience report
The need for software architecture evaluation has drawn considerable attention in recent years. In practice, this is a challenging exercise for two main reasons. First, in deploye...
Ian Gorton, Liming Zhu
EMSOFT
2004
Springer
14 years 2 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
IJAOSE
2008
68views more  IJAOSE 2008»
13 years 8 months ago
Engineering manufacturing control systems using PROSA and delegate MAS
: This paper presents a systematic description of a reusable software architecture for multi-agent systems in the domain of manufacturing control. The architectural description con...
Paul Verstraete, Bart Saint Germain, Paul Valckena...