Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...
— The service-oriented architecture has come a long way in solving the problem of reusability of existing software resources. Grid applications today are composed of a large numb...
This work targets the emerging use of software component technology for high-performance scientific parallel and distributed computing. While component software engineering will ...
Sameer Shende, Allen D. Malony, Craig Edward Rasmu...
The widespread adoption of Free and Open Source Software (FOSS) in many strategic contexts of the information technology society has drawn the attention on the issues regarding ho...
Fabio Mancinelli, Jaap Boender, Roberto Di Cosmo, ...