Sciweavers

1481 search results - page 99 / 297
» Software controlled power management
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 5 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
CAISE
2003
Springer
15 years 9 months ago
Goal-Oriented Requirements Engineering: A Case Study in E-government
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Paolo Donzelli, Paolo Bresciani
ICAC
2009
IEEE
15 years 11 months ago
Model-driven architectural monitoring and adaptation for autonomic systems
Architectural monitoring and adaptation allows self-management capabilities of autonomic systems to realize more powerful adaptation steps, which observe and adjust not only param...
Thomas Vogel, Stefan Neumann, Stephan Hildebrandt,...
MSR
2006
ACM
15 years 10 months ago
Mining version archives for co-changed lines
Files, classes, or methods have frequently been investigated in recent research on co-change. In this paper, we present a first study at the level of lines. To identify line chan...
Thomas Zimmermann, Sunghun Kim, Andreas Zeller, E....
AICCSA
2008
IEEE
267views Hardware» more  AICCSA 2008»
15 years 11 months ago
Comprehensive support for management of enterprise applications
During the last decades, performance of available hardware resources constantly increased [15], which enabled the assignment of more and more complex tasks to software systems. As...
Jens Bruhn, Christian Niklaus, Thomas Vogel, Guido...