As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
The maintenance of global integrity constraints in database federations is still a challenge since traditional integrity constraint management techniques cannot be applied to such ...
Abstract. We describe a general component software framework designed for demanding grid environments that provides optimal performance for the assembled component application. Thi...
Nathalie Furmento, Anthony Mayer, Stephen McGough,...
The software engineering community has introduced component and connector concepts to support architecture-based software descriptions. However, there still exists a gap in transi...
Abstract. Interface-based design relies on the idea that different components of a system may be developed independently and a system designer can connect them together only if th...
Nikolay Stoimenov, Samarjit Chakraborty, Lothar Th...