During their usage, software systems have to be changed constantly. If such changes are implemented in an incomplete or inconsistent way a loss of architectural quality will occur...
: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
Peer-to-Peer-Networking has lately become one of the most popular applications used in the Internet. Today's applications allow users to share files, offer processing power t...
Adoption of the most suitable Requirements Engineering (RE) process and selection of the most appropriate RE techniques for a given project is a common challenge faced by industry...
Metadata management is one of the key concepts of distributed interoperable systems. This paper compares two approaches to building a metadata repository for component-based distr...
Model Integrated Computing employs domainspecific modeling languages for the design of Computer Based Systems and automatically generates their implementation. These system models...
In recent years, there has been an increased need for surveillance capabilities in both civilian and military arenas. Mobile unmanned sensor fleets have long been envisioned as a ...
Kumar Chhokra, Ted Bapty, Jason Scott, Simon Winbe...
Filter cache(FC) is effective in achieving energy saving at the expense of some performance degradation. The energy savings, here, comes from repeated execution of tiny loops from...