Sciweavers

8503 search results - page 244 / 1701
» Secure Software Architectures
Sort
View
154
Voted
IMECS
2007
15 years 6 months ago
On Extendable Software Architecture for Spam Email Filtering
—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
Wanli Ma, Dat Tran, Dharmendra Sharma
MICRO
2007
IEEE
159views Hardware» more  MICRO 2007»
15 years 11 months ago
Software-Based Online Detection of Hardware Defects Mechanisms, Architectural Support, and Evaluation
As silicon process technology scales deeper into the nanometer regime, hardware defects are becoming more common. Such defects are bound to hinder the correct operation of future ...
Kypros Constantinides, Onur Mutlu, Todd M. Austin,...
GECCO
2004
Springer
15 years 10 months ago
Using Interconnection Style Rules to Infer Software Architecture Relations
Software design techniques emphasize the use of abstractions to help developers deal with the complexity of constructing large and complex systems. These abstractions can also be u...
Brian S. Mitchell, Spiros Mancoridis, Martin Trave...
161
Voted
TOOLS
1998
IEEE
15 years 8 months ago
Designing Persistent Object-Oriented Software Architectures
Conventional object-oriented analysis delivers a business object model, which is transformed during design into collaborating class clusters which implement the business model...
Paul Taylor
MKWI
2008
126views Business» more  MKWI 2008»
15 years 6 months ago
A Software Architecture for Grid Utilisation in Business Workflows
: Within an enterprise various information systems have to be run. Enterprise Application Integration (EAI) has become a well-established way to integrate such heterogeneous busine...
Stefan Gudenkauf, Wilhelm Hasselbring, Felix Heine...