Sciweavers

2015 search results - page 220 / 403
» Hidden Software Capabilities
Sort
View
145
Voted
ISORC
2009
IEEE
15 years 10 months ago
Fault-Tolerance for Component-Based Systems - An Automated Middleware Specialization Approach
General-purpose middleware, by definition, cannot readily support domain-specific semantics without significant manual efforts in specializing the middleware. This paper prese...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
148
Voted
ICOST
2009
Springer
15 years 10 months ago
Enhancing OSGi: Semantic Add-ins for Service Oriented Collaborative Environments
Service Oriented Architectures offer an incomparable setting for the management and reuse of services, mixing different factors like software and services. The ability to choose be...
Pablo Cabezas, Raúl Barrena, Jon Legarda, D...
132
Voted
ISW
2009
Springer
15 years 10 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...
MOBISEC
2009
Springer
15 years 10 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
129
Voted
HICSS
2008
IEEE
236views Biometrics» more  HICSS 2008»
15 years 10 months ago
A Case Study: Introducing eXtreme Programming in a US Government System Development Project
The US Military’s ability to meet its mission critical requirements calls for increased agility in its information technology development process. The purpose of this case study...
Ann L. Fruhling, Patrick McDonald, Christopher Dun...