Sciweavers

279 search results - page 29 / 56
» Sorting out software complexity
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 7 months ago
Parallel Hardware Architectures for the Cryptographic Tate Pairing
Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Performance modeling for service oriented architectures
We present a tool for performance modeling of Service Oriented Architectures (SOAs). As mission-critical use of whole-ofgovernment SOAs become pervasive, the capability to model a...
Paul Brebner
CDVE
2007
Springer
136views Visualization» more  CDVE 2007»
14 years 1 months ago
Cooperative Validation in Distributed Control Systems Design
The team of engineers designing and implementing distributed control system software must communicate within a multidisciplinary environment. One of the main problems is the intera...
Dariusz Choinski, Mieczyslaw Metzger, Witold Nocon...
CII
2006
107views more  CII 2006»
13 years 7 months ago
A layered approach to automated electrical safety analysis in automotive environments
Software support for the automotive electrical design process is vital, as many of the safety analysis tasks needing to be carried out, while complex, are repetitive and time cons...
C. J. Price, N. A. Snooke, S. D. Lewis
INFORMATIKTAGE
2008
13 years 9 months ago
Constraint Based Transformation Theory
During the last 25 years the complexity and functionality of software systems has increased dramatically. Software systems have to be updated and restructured continuously [22]. I...
Stefan Natelberg