Sciweavers

1419 search results - page 229 / 284
» Notes on Formalizing Context
Sort
View
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
15 years 2 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
APSEC
2008
IEEE
15 years 2 months ago
Risks and Risk Management in Software Architecture Evolution: An Industrial Survey
The effort that has been made to study risk management in the context of software architecture and its evolution, has so far focused on output from structured evaluations. However...
Odd Petter N. Slyngstad, Reidar Conradi, Muhammad ...
DATE
2008
IEEE
121views Hardware» more  DATE 2008»
15 years 2 months ago
Constraint Refinement for Online Verifiable Cross-Layer System Adaptation
Adaptive resource management is critical to ensuring the quality of real-time distributed applications, particularly for energy-constrained mobile handheld devices. In this contex...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
168
Voted
DSVIS
2008
Springer
15 years 2 months ago
Cascading Dialog Modeling with UsiXML
In the last years User Interface Description Languages (UIDL) appeared as a suitable solution for developing multi-target user interfaces. By applying appropriate model transformat...
Marco Winckler, Jean Vanderdonckt, Adrian Stanciul...
ECSA
2008
Springer
15 years 2 months ago
Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process
A typical software architecture design process requires the architects to make various trade-off architecture decisions. The architects need to consider different possibilities and...
Majid Makki, Ebrahim Bagheri, Ali A. Ghorbani