Sciweavers

2517 search results - page 77 / 504
» Secure Deployment of Components
Sort
View
ESSOS
2009
Springer
15 years 10 months ago
Toward Non-security Failures as a Predictor of Security Faults and Failures
In the search for metrics that can predict the presence of vulnerabilities early in the software life cycle, there may be some benefit to choosing metrics from the non-security rea...
Michael Gegick, Pete Rotella, Laurie Williams
SIGMOD
2008
ACM
143views Database» more  SIGMOD 2008»
16 years 3 months ago
A case study in database reliability: component types, usage profiles, and testing
Data management lies at the core of most modern information technology deployments. Accordingly, the reliability of the database management system (DBMS) is critical to the reputa...
C. A. Taylor, Mechelle Gittens, Andriy V. Miransky...
154
Voted
CBSE
2008
Springer
15 years 5 months ago
Ada-CCM: Component-Based Technology for Distributed Real-Time Systems
: This paper proposes a technology for the development of distributed real-time component-based applications, which takes advantage of the features that Ada offers for the developm...
Patricia López Martínez, José...
IEE
2011
14 years 10 months ago
Using autonomous components to improve runtime qualities of software
: In the development of software systems, quality properties should be considered along with the development process so that the qualities of software systems can be inferred and p...
Wenpin Jiao
WISE
2007
Springer
15 years 9 months ago
Building the Presentation-Tier of Rich Web Applications with Hierarchical Components
Nowadays information systems are increasingly distributed and deployed within the Internet platform. Without any doubt, the World Wide Web represents the de facto standard platform...
Reda Kadri, Chouki Tibermacine, Vincent Le Gloahec