E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
This paper presents a complete codesign environment for embedded systems which combines automatic partitioning with reuse from a module database. Special emphasis has been put on ...
: Prediction of the quality attributes of software architectures requires technologies that enable the application of analytic theories to component models. However, available anal...
Distributed applications that adapt as their environment changes are developed from selfmanaging, self-configuring and self-optimising behaviours. This requires constant monitorin...