Sciweavers

826 search results - page 56 / 166
» Software Reuse: Research and Practice
Sort
View
CCS
2010
ACM
13 years 7 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
AGENTS
2001
Springer
14 years 3 months ago
Specifying agent behavior as concurrent tasks
Software agents are currently the subject of much research in many interrelated fields. Unfortunately, there has not been enough emphasis on defining the techniques required to bu...
Scott A. DeLoach
WISE
2007
Springer
14 years 5 months ago
Building the Presentation-Tier of Rich Web Applications with Hierarchical Components
Nowadays information systems are increasingly distributed and deployed within the Internet platform. Without any doubt, the World Wide Web represents the de facto standard platform...
Reda Kadri, Chouki Tibermacine, Vincent Le Gloahec
VAMOS
2007
Springer
14 years 5 months ago
Variability Models Must Not be Invariant!
Variability modeling techniques are used to specify variable aspects of members of a family of related software artifacts. Instances of variability models are then used to effici...
Elmar Jürgens, Markus Pizka
AOSE
2005
Springer
14 years 4 months ago
Automating Model Transformations in Agent-Oriented Modelling
Abstract. Current Agent-Oriented Software Engineering (AOSE) methodologies adopt a model-based approach for analysis and design, but, in order to become of practical use, they shou...
Anna Perini, Angelo Susi