Sciweavers

690 search results - page 63 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
DAMON
2007
Springer
15 years 10 months ago
The five-minute rule twenty years later, and how flash memory changes the rules
In 1987, Gray and Putzolo presented the five-minute rule, which was reviewed and renewed ten years later in 1997. With the advent of flash memory in the gap between traditional RA...
Goetz Graefe
CSUR
2000
141views more  CSUR 2000»
15 years 3 months ago
On built-in test reuse in object-oriented framework design
: Object-oriented frameworks have extended reusability of software from code modules to architectural and domain information. This paper further extends software reusability from c...
Yingxu Wang, Dilip Patel, Graham King, Ian Court, ...
EUROMICRO
2004
IEEE
15 years 7 months ago
Securing Ad hoc Routing Protocols
Ad hoc networks are subject of many recent research efforts. Especially in mobile scenarios, self-organizing networks are of high interest. While the routing aspects of mobile ad ...
Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred...
CASES
2007
ACM
15 years 7 months ago
Performance evaluation and optimization of dual-port SDRAM architecture for mobile embedded systems
Recently dual-port SDRAM (DPSDRAM) architecture tailored for dual-processor based mobile embedded systems has been announced where a single memory chip plays the role of the local...
Hoeseok Yang, Sungchan Kim, Hae-woo Park, Jinwoo K...
144
Voted
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
15 years 10 months ago
Security Conscious Web Service Composition with Semantic Web Support
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Recently, there has been a growing interest in Web ...
Barbara Carminati, Elena Ferrari, Ryan Bishop, Pat...