Sciweavers

1721 search results - page 182 / 345
» Software Reuse: An Overview
Sort
View
COMCOM
2000
95views more  COMCOM 2000»
13 years 10 months ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen
EUROSYS
2006
ACM
14 years 7 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
ICSE
2008
IEEE-ACM
14 years 11 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard
C3S2E
2009
ACM
14 years 4 months ago
Integrating heterogeneous user interfaces in service oriented web applications
Service Oriented Architecture (SOA) is a design framework that permits the developer to build complex applications from smaller modules called “services”. When applying SOA to...
Matthias Tilsner, Adrian Fiech, Thomas Specht
SOCO
2007
Springer
14 years 4 months ago
Dynamically Adaptable Applications with iPOJO Service Components
Traditional component models and frameworks simplified software system development by enabling developers to break software systems into independent pieces with well-defined interf...
Clément Escoffier, Richard S. Hall