Sciweavers

694 search results - page 124 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
COMPSAC
2008
IEEE
15 years 1 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
SOCO
2008
Springer
14 years 11 months ago
Composing Components and Services Using a Planning-Based Adaptation Middleware
Self-adaptive component-based architectures provide methods and mechanisms to support the dynamic adaptation of their structure under evolving execution context. Dynamic adaptation...
Romain Rouvoy, Frank Eliassen, Jacqueline Floch, S...
EMSOFT
2009
Springer
15 years 6 months ago
Clock-driven distributed real-time implementation of endochronous synchronous programs
An important step in model-based embedded system design consists in mapping functional specifications and their tasks/operations onto execution architectures and their ressources...
Dumitru Potop-Butucaru, Robert de Simone, Yves Sor...
EUROSYS
2006
ACM
15 years 8 months ago
Ferret: a toolkit for content-based similarity search of feature-rich data
Building content-based search tools for feature-rich data has been a challenging problem because feature-rich data such as audio recordings, digital images, and sensor data are in...
Qin Lv, William Josephson, Zhe Wang, Moses Charika...
GLOBECOM
2007
IEEE
15 years 6 months ago
Discovering Topologies at Router Level: Part II
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...