Sciweavers

2429 search results - page 18 / 486
» Using Aspects to Design a Secure System
Sort
View
SSR
2001
104views more  SSR 2001»
13 years 9 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
JSW
2007
116views more  JSW 2007»
13 years 7 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
OOIS
2000
Springer
13 years 11 months ago
Reconfigurability in Object Database Management Systems: An Aspect-Oriented Approach
ABSTRACT. Cost-effective reconfiguration in ODBMSs is difficult to achieve due to the tradeoff between modularity and efficiency. Existing ODBMS designs offer limited reconfigurabi...
Awais Rashid, Ruzanna Chitchyan
SEUS
2008
IEEE
14 years 2 months ago
A Two-Layered Management Architecture for Building Adaptive Real-Time Systems
The concepts of Autonomic and Organic Computing (AC/OC) promise to make modern computer systems more secure and easier to manage. In this paper, we extend the observer/controller a...
Florian Kluge, Sascha Uhrig, Jörg Mische, The...
RTAS
2003
IEEE
14 years 28 days ago
VEST: An Aspect-Based Composition Tool for Real-Time Systems
Building distributed embedded systems from scratch is not cost-effective. Instead, designing and building these systems by using domain specific components has promise. However, i...
John A. Stankovic, Ruiqing Zhu, Ram Poornalingam, ...