Sciweavers

2513 search results - page 102 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
ICSE
2010
IEEE-ACM
14 years 8 months ago
Integrating legacy systems with MDE
Integrating several legacy software systems together is commonly performed with multiple applications of the Adapter Design Pattern in oo languages such as Java. The integration i...
Mickael Clavreul, Olivier Barais, Jean-Marc J&eacu...
MSWIM
2006
ACM
15 years 3 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
TC
2010
14 years 4 months ago
Generating Reliable Code from Hybrid-Systems Models
Hybrid systems have emerged as an appropriate formalism to model embedded systems as they capture the theme of continuous dynamics with discrete control. Under this paradigm, distr...
Madhukar Anand, Sebastian Fischmeister, Yerang Hur...
DEBS
2010
ACM
15 years 1 months ago
An event view model and DSL for engineering an event-based SOA monitoring infrastructure
An event-based solution that uses events to convey information to a monitoring tool is well suited to implementing a non-intrusive monitoring infrastructure. This enables an SOA s...
Emmanuel Mulo, Uwe Zdun, Schahram Dustdar
ICECCS
2008
IEEE
203views Hardware» more  ICECCS 2008»
15 years 4 months ago
Using AADL to Model a Protocol Stack
In recent trends, the Architecture Analysis and Design Language (AADL) has received increasing attention from safety-critical software development industries. Specific about the A...
Didier Delanote, Stefan Van Baelen, Wouter Joosen,...