Sciweavers

1499 search results - page 274 / 300
» A Software Architectural Approach to Security by Design
Sort
View
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 5 days ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
ICWS
2007
IEEE
15 years 1 months ago
An Integrated Development Environment for Web Service Composition
Web services provide an instantiation of the loosely coupled service–oriented architecture and facilitate the process of enterprise application integration by encapsulating info...
Girish Chafle, Gautam Das, Koustuv Dasgupta, Arun ...
AOSE
2005
Springer
15 years 5 months ago
Improving AOSE with an Enriched Modelling Framework
Many approaches and tools assist the various tasks required to develop a multi-agent system (MAS), yet there still remains a gap between the generation of MAS models and program co...
Richard Hill, Simon Polovina, Martin D. Beer
MDAFA
2004
Springer
116views Hardware» more  MDAFA 2004»
15 years 5 months ago
"Weaving" MTL Model Transformations
Model transformations are the core of the MDA approach to software development. As specified by the OMG, model transformations should act on any kind of model of any kind of metamo...
Raul Silaghi, Frédéric Fondement, Al...
DAIS
2009
15 years 27 days ago
A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation
As peer-to-peer systems are evolving from simplistic application specific overlays to middleware platforms hosting a range of potential applications it has become evident that incr...
Gareth Tyson, Paul Grace, Andreas Mauthe, Gordon S...