Sciweavers

2056 search results - page 176 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
BPM
2000
Springer
191views Business» more  BPM 2000»
15 years 8 months ago
ARIS Architecture and Reference Models for Business Process Management
In this article a general business process architecture is presented, which is based on the Architecture of Integrated Information Systems (ARIS) and which is composed of the four ...
August-Wilhelm Scheer, Markus Nüttgens
ICSR
2009
Springer
15 years 11 months ago
Reuse of Architectural Knowledge in SPL Development
Abstract. Software Product Lines (SPL) promote reuse within an application domain in an organized fashion. Preimplemented software components are arranged according to a product li...
Pedro O. Rossel, Daniel Perovich, M. Cecilia Basta...
DAC
2006
ACM
16 years 5 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...
IOLTS
2006
IEEE
68views Hardware» more  IOLTS 2006»
15 years 10 months ago
Power Attacks on Secure Hardware Based on Early Propagation of Data
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
ICSE
2008
IEEE-ACM
16 years 5 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....