Sciweavers

1177 search results - page 159 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
ELPUB
2007
ACM
15 years 4 months ago
Challenges in the Selection, Design and Implementation of an Online Submission and Peer Review System for STM Journals
Two international scientific publishers collaborated to develop an Online Submission and Peer Review System (OSPREY) for their journals. Our goals were to meet market demand, incr...
Judy Best, Richard Akerman
115
Voted
CASES
2006
ACM
15 years 6 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
ECOOPW
2003
Springer
15 years 5 months ago
Modeling Variability for Object-Oriented Product Lines
The concept of a software product line is a promising approach for increasing planned reusability in industry. For planning future requirements, the integration of domain analysis ...
Matthias Riebisch, Detlef Streitferdt, Ilian Pasho...
142
Voted
SIGCOMM
2009
ACM
15 years 7 months ago
BCube: a high performance, server-centric network architecture for modular data centers
This paper presents BCube, a new network architecture specifically designed for shipping-container based, modular data centers. At the core of the BCube architecture is its serve...
Chuanxiong Guo, Guohan Lu, Dan Li, Haitao Wu, Xuan...
87
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh