Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
The effort that has been made to study risk management in the context of software architecture and its evolution, has so far focused on output from structured evaluations. However...
Odd Petter N. Slyngstad, Reidar Conradi, Muhammad ...
Adaptive resource management is critical to ensuring the quality of real-time distributed applications, particularly for energy-constrained mobile handheld devices. In this contex...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
In the last years User Interface Description Languages (UIDL) appeared as a suitable solution for developing multi-target user interfaces. By applying appropriate model transformat...
Marco Winckler, Jean Vanderdonckt, Adrian Stanciul...
A typical software architecture design process requires the architects to make various trade-off architecture decisions. The architects need to consider different possibilities and...