Sciweavers

1855 search results - page 72 / 371
» System Consequence
Sort
View
APSEC
2006
IEEE
15 years 6 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han
SKG
2006
IEEE
15 years 5 months ago
Dynamic Setting, Verification and Adjustment of Upper Bound Constraints in Grid Workflow Systems
Upper bound constraints are often set when complex scientific or business processes are modelled as grid workflow specifications. However, many existing processes such as climate ...
Jinjun Chen, Yun Yang
IPCCC
2005
IEEE
15 years 5 months ago
Real time agreement protocol and resource pre-reservation for wireless system
The third generation of mobile networks aims to offer services diversified to users, while guaranteeing acceptable QoS. This results in the setting up of strategies of increasingl...
Sonia Ben Rejeb, Sami Tabbane, Zièd Choukai...
WMCSA
2002
IEEE
15 years 4 months ago
A Platform Supporting Coordinated Adaptation in Mobile Systems
Mobile environments are highly dynamic, characterised by frequent and sudden changes in resource availability. As a consequence, adaptive mobile applications need to be capable of...
Christos Efstratiou, Adrian Friday, Nigel Davies, ...
MKWI
2008
112views Business» more  MKWI 2008»
15 years 1 months ago
On the Role of Communication, Documentation and Experience during System Testing - An Interview Study
: The quality of business software is more and more becoming a competitive factor. As complete testing is impossible, testers have to make decisions, e.g. to choose which parts of ...
Timea Illes-Seifert, Barbara Paech