Sciweavers

1026 search results - page 82 / 206
» Software Engineering for Self-Adaptive Systems: A Research R...
Sort
View
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 7 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
DICS
2006
15 years 1 months ago
Dependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. 1 OVERVIEW ...
Bertrand Meyer
CAISE
2005
Springer
15 years 5 months ago
Organizational Model to Derive Multi-Agent Architecture from Requirements
Abstract. Understanding and supporting the interaction between software requirements and architectures remains one of the challenging problems in software engineering research. To ...
Lúcia R. D. Bastos, Jaelson Brelaz de Castr...
HICSS
2006
IEEE
130views Biometrics» more  HICSS 2006»
15 years 6 months ago
Towards a Methodology for the Development of Integrated IT Infrastructures
In this paper, the authors propose and validate a methodology for the development of integrated Information Technology (IT) infrastructures. The motivation for putting forward a n...
ICSE
1998
IEEE-ACM
15 years 4 months ago
Consistency Management for Complex Applications
Consistency management is an important requirement in many complex applications, but current programming languages and database systems provide inadequate support for it. To addre...
Peri L. Tarr, Lori A. Clarke