Sciweavers

2236 search results - page 229 / 448
» Secure Software Design in Practice
Sort
View
OOPSLA
2004
Springer
15 years 8 months ago
A framework for detecting, assessing and visualizing performance antipatterns in component based systems
Component-based enterprise systems often suffer from performance issues as a result of poor system design. In this paper, we propose a framework to automatically detect, assess an...
Trevor Parsons
P2P
2010
IEEE
136views Communications» more  P2P 2010»
15 years 1 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
153
Voted
TACS
2001
Springer
15 years 7 months ago
Lightweight Analysis of Object Interactions
The state of the practice in object-oriented software development has moved beyond reuse of code to reuse of conceptual structures such as design patterns. This paper draws attenti...
Daniel Jackson, Alan Fekete
EXTREME
2003
ACM
15 years 8 months ago
Can Topic Maps describe context for enterprise-wide applications?
Topic maps provide exciting opportunities not just to make information easier to find, but to increase the usability of software. In order to provide users with the information th...
Duane Degler, Lisa Battle
ISCAS
2008
IEEE
102views Hardware» more  ISCAS 2008»
15 years 9 months ago
Asynchronous balanced gates tolerant to interconnect variability
Abstract— Existing methods of gate level power attack countermeasures depend on exact capacitance matching of the dual-rail data outputs of each gate. Process variability and a l...
Konrad J. Kulikowski, Vyas Venkataraman, Zhen Wang...