Sciweavers

SAC
2005
ACM
13 years 10 months ago
Handling run-time updates in distributed applications
The server side of business software systems is commonly implemented today by an ensemble of Java classes distributed over several hosts. In this scenario, it is often necessary, ...
Marco Milazzo, Giuseppe Pappalardo, Emiliano Tramo...
IRI
2005
IEEE
13 years 10 months ago
Towards scalable and adaptable software architectures
Developing scalable and adaptable architectures that can accommodate evolving changes is crucial for reducing software development cost. To achieve scalability and adaptability, d...
Mohamed Fayad, Haitham S. Hamza, Huáscar A....
CCECE
2006
IEEE
13 years 11 months ago
Software Architecture with Visual Frameworks
We present an overview of a software architecting method and visual language we call Visual Frameworks. The method creates concrete, strongly typed software architectures throu...
Paul Tarvydas, Norm Sanford
DAMON
2007
Springer
13 years 11 months ago
The five-minute rule twenty years later, and how flash memory changes the rules
In 1987, Gray and Putzolo presented the five-minute rule, which was reviewed and renewed ten years later in 1997. With the advent of flash memory in the gap between traditional RA...
Goetz Graefe
EUROMICRO
2007
IEEE
13 years 11 months ago
Using Model Differencing for Architecture-level Regression Testing
Regression testing can be systematically applied at the software architecture level in order to reduce the cost of retesting modified systems, and also to assess the regression t...
Henry Muccini
ECBS
2007
IEEE
98views Hardware» more  ECBS 2007»
13 years 11 months ago
A Process Module to Pre-Process Requirements for Architecting
Software architectures have a significant impact on software quality. However, building architectures is a non-trivial task. In this paper, we present a process module for pre-pro...
Matthias Galster, Armin Eberlein, Mahmood Moussavi
IEEEARES
2009
IEEE
13 years 11 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen
SAC
2010
ACM
13 years 11 months ago
A real-time architecture design language for multi-rate embedded control systems
This paper presents a language dedicated to the description of the software architecture of complex embedded control systems. The language relies on the synchronous approach but e...
Julien Forget, Frédéric Boniol, Davi...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Reference architecture knowledge representation: an experience
Software architectures have played a significant role in determining the success of software systems. In spite of impact of the architectures to the software development and, as a...
Elisa Yumi Nakagawa, José Carlos Maldonado
ICSE
2008
IEEE-ACM
14 years 5 months ago
The international workshop on software architectures and mobility (SAM 2008)
E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...