Sciweavers

643 search results - page 90 / 129
» tools 1998
Sort
View
ACSAC
1998
IEEE
14 years 2 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
CODES
1998
IEEE
14 years 2 months ago
Hardware/software co-design of an ATM network interface card: a case study
This paper discusses a case study, the co-design of an ATM Network Interface Card (NIC). The NIC is aimed to interface applications with the physical network line. It is composed ...
Jean-Marc Daveau, Gilberto Fernandes Marchioro, Ah...
COMPSAC
1998
IEEE
14 years 2 months ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi
CSMR
1998
IEEE
14 years 2 months ago
A Method for Assessing Legacy Systems for Evolution
Legacy systems are usually critical to the business in which they operate, but the costs of running them are often not justifiable. Determining whether such systems are worth keep...
Jane Ransom, Ian Sommerville, Ian Warren
DEXAW
1998
IEEE
155views Database» more  DEXAW 1998»
14 years 2 months ago
Business-Oriented Component-Based Software Development and Evolution
Huge size and high complexity of legacy software are the main sources of today's software evolution problems. While we can ease software evolution with re-engineering tools, ...
Stan Jarzabek, Martin Hitz