Sciweavers

676 search results - page 16 / 136
» Mining Patterns to Support Software Architecture Evaluation
Sort
View
82
Voted
SAFECOMP
2005
Springer
15 years 3 months ago
Problem Frames and Architectures for Security Problems
Abstract. We present several problem frames that serve to structure, characterize and analyze software development problems in the area of software and system security. These probl...
Denis Hatebur, Maritta Heisel
CCECE
2006
IEEE
15 years 3 months ago
Security Design Patterns: Survey and Evaluation
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the apperance of this rese...
Marc-André Laverdière, Azzam Mourad,...
WCRE
2006
IEEE
15 years 3 months ago
Mining Control Flow Graphs for Crosscutting Concerns
Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adaption to an aspect-oriented design. This paper describes an automatic static asp...
Jens Krinke
MICRO
2010
IEEE
215views Hardware» more  MICRO 2010»
14 years 8 months ago
A Task-Centric Memory Model for Scalable Accelerator Architectures
This paper presents a task-centric memory model for 1000-core compute accelerators. Visual computing applications are emerging as an important class of workloads that can exploit ...
John H. Kelm, Daniel R. Johnson, Steven S. Lumetta...
ICCS
2003
Springer
15 years 2 months ago
Design and Evaluation of Distributed Smart Disk Architecture for I/O-Intensive Workloads
Smart disks, a type of processor-embedded active I/O devices, with their on-disk memory and network interface controller, can be viewed as processing elements with attached storage...
Steve C. Chiu, Wei-keng Liao, Alok N. Choudhary