Filters








7,562 Hits in 6.0 sec

Automatic adaptor synthesis for protocol transformation [article]

Marco Autili, Paola Inverardi, Massimo Tivoli
2014 arXiv   pre-print
for the set of components.  ...  We address these problems enhancing our architectural approach which allows for detection and recovery of integration mismatches by synthesizing a suitable coordinator.  ...  This graph is obtained by filtering the LTS specification of K1. This is done by using the algorithm formalized in [2] .  ... 
arXiv:1412.0527v1 fatcat:ngy2ndodqzg7hjwlm5dooeoeam

Foundations and Tools for End-User Architecting [chapter]

David Garlan, Vishal Dwivedi, Ivan Ruchkin, Bradley Schmerl
2012 Lecture Notes in Computer Science  
Creating such compositions today typically requires low-level technical expertise, limiting the use of computational methods and increasing the cost of using them.  ...  Drawing on the rich heritage of software architecture languages, methods, and tools, we show how those techniques can be adapted to support end users in composing rich computational systems through domain-specific  ...  Acknowledgments This work was supported in part by the Office of Naval Research grant ONR-N000140811223, and the Center for Computational Analysis of Social and Organizational Systems (CA-SOS).  ... 
doi:10.1007/978-3-642-34059-8_9 fatcat:rp6xrxi6x5he5jug6fqrh7plkq

Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android

Hamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand, Sam Malek
2016 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)  
The approach, realized in a tool, called SEPAR, combines static analysis with lightweight formal methods to automatically infer security-relevant properties from a bundle of apps.  ...  As the dominant mobile computing platform, Android has become a prime target for cyber-security attacks.  ...  To the best of our knowledge, SEPAR is the first formally-precise technique for automated synthesis and dynamic enforcement of Android security policies. IX.  ... 
doi:10.1109/dsn.2016.53 dblp:conf/dsn/BagheriSBM16 fatcat:q4rqzejtmva45lcpl3sk475jwu

AVANTE: An architecture of CORBA components and XML Metadata for Web Based Instruction

Adelaide Bianchini, Victor Theoktisto, Edna Ruckhaus
2002 CLEI Electronic Journal  
A filter-mapping service in the Presentation layer produces the dynamic HTML web pages needed for user interaction, processing these XML descriptions by applying one or more previously defined XSL stylesheets  ...  The AVANTE Architecture is a WBI environment assembled using CORBA distributed components, implementing core services such as course management, user authentication, collaborative work, database access  ...  The XML-XSL Filter-Mapping Component transforms this representation using associated XSL templates, and producing the instantiated data needed for the next processes.  ... 
doi:10.19153/cleiej.5.2.1 fatcat:7xj4pbnhprfsfdzmhydxuqwen4

Layered Connectors [chapter]

Amel Bennaceur, Valérie Issarny
2014 Lecture Notes in Computer Science  
We provide formal semantics of layered connectors and present an approach for the synthesis of layered connectors in order to enable the dynamic composition of highly heterogeneous components.  ...  In this paper, we propose a formal approach to represent and reason about interactions between components using layered connectors.  ...  Formal Basis of Architectural Connection.  ... 
doi:10.1007/978-3-319-09970-5_25 fatcat:vybopz5egjbovhdbo3qmgemlte

On Enabling Dependability Assurance in Heterogeneous Networks through Automated Model-Based Analysis [chapter]

Paolo Masci, Nicola Nostro, Felicita Di Giandomenico
2011 Lecture Notes in Computer Science  
The library builds on classical dependability patterns, such as majority voting and retry, and uses the concept of overlay networks for triggering the synthesis of specific dependability mechanisms in  ...  We present the specification of a basic library of dependability mechanisms that can be used within automated approaches for synthesising dependable Connectors in heterogeneous networks.  ...  The mechanism has been used, for instance, in [22] for defining an overlay-based architecture for enhancing the quality of service of best-effort services over the Internet.  ... 
doi:10.1007/978-3-642-24124-6_7 fatcat:pjjnnkecdfc3vb3tavnvpyti6y

Memory-span concepts and the synthesis of sequential machines in feedback shift-register form

Robert L. Martin
1967 8th Annual Symposium on Switching and Automata Theory (SWAT 1967)  
Architecture Design Register Transfer design; High-level synthesis; Architecture for low power; Architecture testing.  ...  , Characteristics of commonly used Analog Filters, Some examples of Digital Filters Designs based on the Bilinear Transformation.  ...  Mobile Operating Systems Operating System, PalmOS, Windows CE, Symbian OS, Linux for Mobile Devices.  ... 
doi:10.1109/focs.1967.19 dblp:conf/focs/Martin67 fatcat:fwn5xjv7mbcsja5xrhcmdo6ipe

On the Automated Synthesis of Enterprise Integration Patterns to Adapt Choreography-based Distributed Systems

Marco Autili, Amleto Di Salle, Alexander Perucci, Massimo Tivoli
2015 Electronic Proceedings in Theoretical Computer Science  
In this direction, this paper leverages previous work on the automatic synthesis of choreography-based systems, and describes our preliminary steps towards exploiting Enterprise Integration Patterns to  ...  A key enabler for this vision is then the ability to automatically compose and dynamically coordinate software services.  ...  For instance, the use of ontological information will be indeed useful in the future since we plan to extend our method so to account also for other kinds of EIP (e.g., Message Transformation EIP like  ... 
doi:10.4204/eptcs.201.3 fatcat:wmhdr5rk4zcy3mbljzkaox2quu

The application of threshold logic to the design of sequential machines

Gilbert M. Masters, Richard L. Mattson
1966 Annual Symposium on Switching and Automata Theory  
Digital Communication through fading multi-path channels: Characterization of fading multi-path channels, the effect of signal characteristics on the choice of a channel model, frequency-Nonselective,  ...  slowly fading channel, diversity techniques for fading multi-path channels, Digital signal over a frequency-selective, slowly fading channel, coded wave forms for fading channels, multiple antenna systems  ...  Speech Enhancement: Spectral subtraction & filtering, Harmonic filtering, parametric re-synthesis, Adaptive noise cancellation.  ... 
doi:10.1109/swat.1966.29 dblp:conf/focs/MastersM66 fatcat:ierxfghv4vcpbbh2iaktwfdzlm

Rigorous system design

Joseph Sifakis
2014 Proceedings of the 2014 ACM symposium on Principles of distributed computing - PODC '14  
I would like to thank in particular Saddek Bensalem, Marius Bozga, Jacques Combaz, and Simon Bliudze for their contribution to the development of the BIP framework.  ...  Correctness is achieved mainly by construction through extensive use of architectures and of powerful synthesis tools.  ...  Component-based construction: Components are essential for enhanced productivity and correctness through reuse and architectures.  ... 
doi:10.1145/2611462.2611517 dblp:conf/podc/Sifakis13 fatcat:dmj4scewsrhfvf3rxbtqpeacxa

2018 Index IEEE Transactions on Computers Vol. 67

2019 IEEE transactions on computers  
., A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol; 1622-1636 Feng, D., see Fu, M., TC Sept. 2018 1259-1272 Analysis  ...  ., þ, TC Jan. 2018 102- 114 Filtering Principal Component Analysis Based Filtering for Scalable, High Precision k-NN Search.  ...  ., þ, TC Aug. 2018 1193-1201 Estimation Principal Component Analysis Based Filtering for Scalable, High Precision k-NN Search.  ... 
doi:10.1109/tc.2018.2882120 fatcat:j2j7yw42hnghjoik2ghvqab6ti

On the architecture and development life cycle of secure cyber-physical systems

Cong Sun, Jianfeng Ma, Qingsong Yao
2016 Journal of Communications and Information Networks  
We provide a comprehensive survey on the domain-specific architectures, countermeasure techniques and security standards involved in the development life cycle of VHFXULW\FULWLFDO F\EHUSK\VLFDO V\VWHPV  ...  Integrating security-related activities into the early phases of the development life cycle is a monolithic and cost-effective solution for the development of security-critical cyber-physical V\VWHPV 7KHVH  ...  In an automotive scenario, the system architecture can be transformed to a continuous-time Markov model whose transition rates are determined by the security assessment of each component >@ .  ... 
doi:10.1007/bf03391576 fatcat:ykws4j5rgrcp7g53rciyqapnoi

Software architecture: a travelogue

David Garlan
2014 Proceedings of the on Future of Software Engineering - FOSE 2014  
Moreover, the changing face of technology raises a number of challenges for software architecture.  ...  During that time there has been considerable progress in developing the technological and methodological base for treating architectural design as an engineering discipline.  ...  For example, a pipe-filter style will likely apply to any system that is primarily transformational, but can be equally useful in domains such as signal processing, music synthesis, scientific workflow  ... 
doi:10.1145/2593882.2593886 dblp:conf/icse/Garlan14 fatcat:pxuxk3iqwbas3amxlpapfehsqu

Integrated, Reliable and Cloud-Based Personal Health Record : A Scoping Review

Jesus Romero, Pablo Lopez, Jose Luis Vazquez Noguera, Cristian Cappo, Diego P. Pinto-Roa, Cynthia Villalba
2016 Health Informatics - An International Journal  
Architecture PHR design should be in accordance to these, and take advantage of nowadays technology.  ...  Information reliability is based in ABE security-privacy mechanism. Cloud-based technology access is achieved via SOA.  ...  avoiding bottlenecks and enhancing security in the 1 articles were included in the final synthesis.  ... 
doi:10.5121/hiij.2016.5301 fatcat:ppp33rdax5f3fhohrhhm4ua4ja

Extending UML/MARTE to Support Discrete Controller Synthesis, Application to Reconfigurable Systems-on-Chip Modeling

Sébastien Guillet, Florent de Lamotte, Nicolas le Griguer, Éric Rutten, Guy Gogniat, Jean-Philippe Diguet
2014 ACM Transactions on Reconfigurable Technology and Systems  
This article presents the first framework to design and synthesize a formal controller managing dynamic reconfiguration, using a model-driven engineering methodology based on an extension of UML/MARTE.  ...  An application model of an image processing application is presented, then transformed and synthesized to be executed on a Xilinx platform to show how the controller, executed on a Microblaze, manages  ...  Guillet et al. systems-is first enhanced with control information and then transformed into a synchronous specification, named BZR, to be synthesized by a formal tool (SIGALI).  ... 
doi:10.1145/2629628 fatcat:m3umuaz2tnhglgsad6we7bikhi
« Previous Showing results 1 — 15 out of 7,562 results