To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
A discrete control system, with stringent hardware constraints, is effectively an embedded real-time system and hence requires a rigorous methodology to develop the software invol...
Lucas Cordeiro, Carlos Mar, Eduardo Valentin, Fabi...
The authors have proposed using category-theoretic sketches to enhance database design and integration methodologies. The algebraic context is called the Sketch Data Model (SkDM) a...
It is shown how software metrics and architectural patterns can be used for the management of software evolution. In the presented architecture-centric software evolutionmethod th...
Juha Gustafsson, Jukka Paakki, Lilli Nenonen, A. I...
VoDKA is a Video-on-Demand server developed using Erlang/OTP. In this paper, the evolution of the core architecture of the system, designed for improving resource modelling, is de...