Sciweavers

2056 search results - page 167 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
ICSE
2008
IEEE-ACM
16 years 4 months ago
Exploiting connector knowledge to efficiently disseminate highly voluminous data sets
Ever-growing amounts of data that must be distributed from data providers to consumers across the world necessitate a greater understanding of the software architectural implicati...
Chris Mattmann, David Woollard, Nenad Medvidovic
ARCS
2006
Springer
15 years 8 months ago
Estimating Energy Consumption for an MPSoC Architectural Exploration
Early energy estimation is increasingly important in MultiProcessor System-On-Chip (MPSoC) design. Applying traditional approaches, which consist in delaying the estimation until t...
Rabie Ben Atitallah, Smaïl Niar, Alain Greine...
CODES
2004
IEEE
15 years 8 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys
OOPSLA
2005
Springer
15 years 10 months ago
CanonSketch and TaskSketch: innovative modeling tools for usage-centered design
Two experimental tools to support usage-centered design using l use cases and canonical abstract prototypes are described. The models and methods of usage-centered design are outl...
Larry L. Constantine, Pedro Campos
PROFES
2007
Springer
15 years 10 months ago
An Industrial Survey of Software Outsourcing in China
Most studies of software outsourcing focus on how to manage the outsourcing from the perspective of the outsourcer, i.e., a company issuing a subcontract. There are few studies of ...
Jianqiang Ma, Jingyue Li, Weibing Chen, Reidar Con...