Abstract— This work presents an infrastructure that simplifies the development of distributed applications that can adapt automatically to nonfunctional properties of their comp...
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Abstract -- Software architectures enable large-scale software development. Component reuse and substitutability, two key aspects of large-scale development, must be planned for du...
Nenad Medvidovic, Peyman Oreizy, Jason E. Robbins,...
Decomposition is a powerful technique for reducing the size of a backtracking search tree. However, when solving constraint optimization problems (COP's) the standard techniqu...
: We present a framework that verifies and maintains the consistency between the representations of the form, function and behavior of mechatronic devices. These three aspects of t...
Rajarishi Sinha, Christiaan J. J. Paredis, Pradeep...