Optimizing resource utilization using transformations

M Potkonjak, J Rabaey - IEEE Transactions on Computer-Aided …, 1994 - ieeexplore.ieee.org
The goal of the high level synthesis process for real time applications is to minimize the
implementation cost, while still satisfying all timing constraints. In this paper, the authors …

[PDF][PDF] Engineering Security into Distributed Systems: A Survey of Methodologies.

AV Uzunov, EB Fernandez, K Falkner - J. Univers. Comput. Sci., 2012 - core.ac.uk
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …

On synergies of cyber and physical security modelling in vulnerability assessment of railway systems

S Marrone, RJ Rodríguez, R Nardone… - Computers & electrical …, 2015 - Elsevier
The multifaceted nature of cyber-physical systems needs holistic study methods to detect
essential aspects and interrelations among physical and cyber components. Like the …

Modelling security of critical infrastructures: a survivability assessment

RJ Rodríguez, J Merseguer, S Bernardi - The Computer Journal, 2015 - academic.oup.com
Critical infrastructures, usually designed to handle disruptions caused by human errors or
random acts of nature, define assets whose normal operation must be guaranteed to …

Security solution frames and security patterns for authorization in distributed, collaborative systems

AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2015 - Elsevier
The design of an authorization infrastructure is one of the most important aspects of
engineering a secure software system. Unlike other system types, distributed systems–and …

[PDF][PDF] A Relational Approach to Model Transformation with QVT Relations Supporting Model Synchronization.

K Ma, B Yang, Z Chen… - J. Univers. Comput …, 2011 - isda2001.softcomputing.net
With the help of model transformation, it is possible to generate target models from source
models. A possible way to face iterative development process with frequent modifications is …

Visual modeling for web 2.0 applications using model driven architecture approach

IC Hsu - Simulation Modelling Practice and Theory, 2013 - Elsevier
Mashup is now a major Web 2.0 technology because, rather than simply aggregating Web
content, it combines various Web resources from other websites. Considering Web 2.0 …

Systematic design of secure Mobile Grid systems

DG Rosado, E Fernandez-Medina, J Lopez… - Journal of Network and …, 2011 - Elsevier
Grid computing has arisen as an evolution of distributed systems mainly focused on the
sharing of and remote access to resources in a uniform, transparent, secure, efficient and …

New framework for policy support for mobile grid services

T Alwada'n, H Janicke, O Aldabbas… - 2011 6th International …, 2011 - ieeexplore.ieee.org
In a multi-organization environment like the GRID, each institute might want to apply some
boundaries on how its resources are being utlized by other institutes. A disagreement …

Policy-based support for mobile grid services

T Alwada'n, T Khdour, H Janicke… - International …, 2013 - search.proquest.com
In a multi-organization environment like the GRID, each institute might want to apply some
boundaries on how its resources are being utilized by other institutes. A disagreement …