The realization of multimedia systems still heavily relies on building monolithic systems that need to be reengineered for every change in the application and little of which can ...
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
This paper proposes a service-oriented software reliability model that dynamically evaluates the reliability of Web services. There are two kinds of Web services: atomic services ...
Wei-Tek Tsai, Dawei Zhang, Yinong Chen, Hai Huang,...
Crosscutting concerns are pervasive in embedded software, because of the various constraints imposed by the environment and the stringent QOS requirements on the system. This pape...
Thomas Cottenier, Aswin van den Berg, Tzilla Elrad
Programs of a software product line can be synthesized by composing features which implement some unit of program functionality. In most product lines, only some combination of fe...