Sciweavers

757 search results - page 109 / 152
» Composing Security-Aware Software
Sort
View
MSS
1999
IEEE
137views Hardware» more  MSS 1999»
15 years 2 months ago
Overview of a TRW Pilot Program
Recently TRW fielded a prototype system for a government customer. It provides a wide range of capabilities including data collection, hierarchical storage, automated distribution...
William A. Olsen
COMPSAC
1997
IEEE
15 years 2 months ago
Classifying Architectural Elements as a Foundation for Mechanism Matching
Building a system at the architectural level can be thought of as decomposition into components followed by a series of exercises in matching. Components must be composed with eac...
Rick Kazman, Paul C. Clements, Leonard J. Bass, Gr...
CSMR
2010
IEEE
14 years 5 months ago
Does the Past Say It All? Using History to Predict Change Sets in a CMDB
To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all...
Sarah Nadi, Richard C. Holt, Serge Mankovski
WWW
2004
ACM
15 years 10 months ago
Type based service composition
Service matchmaking and composition has recently drawn increasing attention in the research community. Most existing algorithms construct chains of services based on exact matches...
Ion Constantinescu, Boi Faltings, Walter Binder
WWW
2004
ACM
15 years 10 months ago
Compositional knowledge management for medical services on semantic web
The vision of the Semantic Web is to reduce manual discovery and usage of Web resources (documents and services) and to allow software agents to automatically identify these Web r...
Yugyung Lee, Chintan Patel, Soon Ae Chun, James Ge...