Sciweavers

690 search results - page 24 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
120
Voted
ICSE
2004
IEEE-ACM
16 years 3 months ago
The Dublo Architecture Pattern for Smooth Migration of Business Information Systems: An Experience Report
While the importance of multi-tier architectures for enterprise information systems is widely accepted and their benefits are well published, the systematic migration from monolit...
Wilhelm Hasselbring, Ralf Reussner, Holger Jaekel,...
136
Voted
SAC
2008
ACM
15 years 3 months ago
A software architecture for ontology-driven situation awareness
Human operators of large-scale control systems face the problem of information overload induced by the large amount of information provided by multiple heterogeneous and highlydyn...
Norbert Baumgartner, Werner Retschitzegger, Wielan...
155
Voted
ICAI
2003
15 years 5 months ago
A Secure Agent Architecture for Sensor Networks
Advances in sensor and wireless technologies will enable thousands, or even millions of small but smart sensors to be deployed for a wide range of monitoring applications. The sen...
Zhaoyu Liu, Yongge Wang
153
Voted
AAAI
2004
15 years 5 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
163
Voted
CSMR
1998
IEEE
15 years 8 months ago
Assessing Architectural Complexity
While it is widely agreed that architectural simplicity is a key factor to the success of large software systems, it is not obvious how to measure architectural complexity. Our ap...
Rick Kazman, M. Burth