Sciweavers

1752 search results - page 105 / 351
» Application Specific Processing: A Tools Approach
Sort
View
ICSE
2007
IEEE-ACM
16 years 3 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
90
Voted
CAISE
2003
Springer
15 years 8 months ago
Building a Collaborative Information Agent in a HomeBot Application
Abstract Information agents are cooperative agents whose main goal is to collaborate and assist task agents like mobile agents in obtaining information from heterogeneous data sour...
Lito Perez Cruz, Arkady B. Zaslavsky, David Squire
DSN
2008
IEEE
15 years 5 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
IWSSD
2000
IEEE
15 years 7 months ago
Issues in Analyzing the Behavior of Event Dispatching Systems
A good architecture is a necessary condition to guarantee that the expected levels of performance, availability, fault tolerance, and scalability are achieved by the implemented s...
Giovanni Bricconi, Emma Tracanella, Elisabetta Di ...
PPDP
2004
Springer
15 years 8 months ago
JIAD: a tool to infer design patterns in refactoring
Refactoring in object-orientation has gained increased attention due to its ability to improve design quality. Refactoring using design patterns (DPs) leads to production of high ...
J. Rajesh, D. Janakiram