Sciweavers

371 search results - page 18 / 75
» Adaptation hiding modularity
Sort
View
EDO
2006
Springer
15 years 1 months ago
Improving modularity of reflective middleware with aspect-oriented programming
Reflective middleware has been proposed as an effective way to enhance adaptability of component-oriented middleware architectures. To be effectively adaptable, the implementation...
Nélio Cacho, Thaís Vasconcelos Batis...
IUI
1997
ACM
15 years 1 months ago
Evaluating the Utility and Usability of an Adaptive Hypermedia System
We have evaluated an adaptive hypermedia system, PUSH, and compared it to a non-adaptive variant of the same system. Based on an inferred information-seeking task, PUSH chooses wh...
Kristina Höök
81
Voted
STOC
2005
ACM
103views Algorithms» more  STOC 2005»
15 years 10 months ago
New and improved constructions of non-malleable cryptographic protocols
We present a new constant round protocol for non-malleable zero-knowledge. Using this protocol as a subroutine, we obtain a new constant-round protocol for non-malleable commitmen...
Rafael Pass, Alon Rosen
72
Voted
AIS
2004
Springer
15 years 3 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
ISORC
1999
IEEE
15 years 1 months ago
Automated Dependability Analysis of UML Designs
This paper deals with the automatic dependability analysis of systems designed using UML. An automatic transformations is defined for the generation of models to capture systems d...
Andrea Bondavalli, Ivan Mura, István Majzik