Sciweavers

690 search results - page 65 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
176
Voted
AGENTS
1998
Springer
15 years 8 months ago
Cognition and Affect: Architectures and Tools
Which agent architectures are capable of justifying descriptions in terms of the `higher level' mental concepts applicable to human beings? We propose a new kind of architect...
Aaron Sloman, Brian Logan
METRICS
2003
IEEE
15 years 9 months ago
Measuring and Improving Design Patterns Testability
This paper addresses not only the question of testability measurement of OO designs but also focuses on its practicability. While detecting testability weaknesses (called testabil...
Benoit Baudry, Yves Le Traon, Gerson Sunyé,...
140
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
131
Voted
SIGSOFT
2008
ACM
16 years 4 months ago
Towards compositional synthesis of evolving systems
Synthesis of system configurations from a given set of features is an important and very challenging problem. This paper makes a step towards this goal by describing an efficient ...
Shiva Nejati, Mehrdad Sabetzadeh, Marsha Chechik, ...
153
Voted
EDBT
2008
ACM
178views Database» more  EDBT 2008»
16 years 4 months ago
An inductive database and query language in the relational model
In the demonstration, we will present the concepts and an implementation of an inductive database ? as proposed by Imielinski and Mannila ? in the relational model. The goal is to...
Lothar Richter, Jörg Wicker, Kristina Kessler...