default search action
11th ECSA 2017: Canterbury, UK
- Rogério de Lemos:
11th European Conference on Software Architecture, ECSA 2017, Companion Proceedings, Canterbury, United Kingdom, September 11-15, 2017. ACM 2017, ISBN 978-1-4503-5217-8
Women in software architecture
- Elisa Yumi Nakagawa, Ana Allian, Brauner R. N. Oliveira, Bruno Sena, Carlos Eduardo de Barros Paes, Cristiane Lana, Daniel Feitosa, Daniel Soares Santos, Dênis Zaniro, Diogenes Dias, Flávio Eduardo Aoki Horita, Frank José Affonso, Gabriel Abdalla, Isabella Vicente, Leonardo Simas Duarte, Kátia Romero Felizardo, Lina Maria Garcés Rodriguez, Lucas Bueno Ruas de Oliveira, Marcelo Benites Gonçalves, Maria Gabriela Morais, Milena Guessi, Nilson Silva, Thiago Bianchi, Tiago Volpato, Valdemar Vicente Graciano Neto, Vinícius Augusto Tagliatti Zani, Wallace Manzano:
Software architecture and reference architecture of software-intensive systems and systems-of-systems: contributions to the state of the art. 4-11 - Silvia Bonfanti, Valentina Centurelli, Elvinia Riccobene, Patrizia Scandurra:
The female contribution in architecting a set of tools for a formal method: role of women in software architecture (short paper). 12-15 - Fahimeh Alizadeh Moghaddam, Robert Deckers, Giuseppe Procaccianti, Paola Grosso, Patricia Lago:
A domain model for self-adaptive software systems. 16-22 - Claudia Raibulet, Francesca Arcelli Fontana:
Evaluation of self-adaptive systems: a women perspective. 23-30 - Maria Spichkova, Heinz W. Schmidt, Catia Trubiani:
Role of women in software architecture: an attempt at a systematic literature review. 31-34
Doctoral symposium
- Germania Rodríguez Morales, Jennifer Pérez Benedí:
Towards a reference software architecture for improving the accessibility and usability of open course ware. 35-38 - Eduardo Silva:
Taming missions and architecture in software intensive systems-of-systems. 39-43 - Andrew Leigh:
Architecture analysis to predict project risks: using containers to aid risk assessment. 44-47 - Manoj Bhat, Klym Shumaiev, Florian Matthes:
Towards a framework for managing architectural design decisions. 48-51
Tool demonstrations
- Leo Pruijt, Wiebe Wiersema, Jan Martijn E. M. van der Werf:
Software architecture reconstruction research support as provided by HUSACCT. 52-55 - Mohammad Sharaf, Moamin Abughazala, Henry Muccini, Mai Abusair:
CAPSim: simulation and code generation based on the CAPS. 56-60 - Philip Wizenty, Jonas Sorgalla, Florian Rademacher, Sabine Sachweh:
MAGMA: build management-based generation of microservice infrastructures. 61-65
Posters
- Mohammad Sharaf, Moamin Abughazala, Henry Muccini, Mai Abusair:
Simulating architectures of situational-aware cyber-physical space. 66-67
Workshop on context-aware, autonomous and smart architecture (CASA 2017)
- Tomás Bures:
Autonomic component ensembles for dynamic evolving architectures of context-aware smart systems: invited talk abstract. 70 - Mai Abusair, Antinisca Di Marco, Paola Inverardi:
An empirical approach for determining context of mobile systems. 71-77 - Mai Abusair, Mohammad Sharaf, Henry Muccini, Paola Inverardi:
Adaptation for situational-aware cyber-physical systems driven by energy consumption and human safety. 78-84 - Bahtijar Vogel, Dimitrios Gkouskos:
An open architecture approach: towards common design principles for an IoT architecture. 85-88 - Anna Reale, Melinda Tóth, Zoltán Horváth:
Towards context aware computations offloading in 5G. 89-92
Fourth international workshop on measurability of security in software architectures (MeSSa 2017)
- Teemu Kanstrén, Pekka Savolainen, Petteri Heino, Kaisu Kanstrén:
A study on cybersecurity industrial end-user perspectives in Finland. 95-101 - Mattias T. Gebrie, Habtamu Abie:
Risk-based adaptive authentication for internet of things in smart home eHealth. 102-108 - Sigurd Eskeland:
Communication-efficient privacy-preserving smart metering. 109-114 - Ping Chen, Jonas Visschers, Cedric Verstraete, Letizia Paoli, Christophe Huygens, Lieven Desmet, Wouter Joosen:
The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies. 115-120 - Reijo M. Savola:
Current level of cybersecurity competence and future development: case Finland. 121-124 - Teemu Väisänen:
Categorization of cyber security deception events for measuring the severity level of advanced targeted breaches. 125-131 - Kimmo Halunen, Anni Karinsalo:
Measuring the value of privacy and the efficacy of PETs. 132-135
Fourth workshop on software architecture erosion and architectural consistency (SAEroCon 2017)
- Jörg Lenhard, Mohammad Mahdi Hassan, Martin Blom, Sebastian Herold:
Are code smell detection tools suitable for detecting architecture degradation? 138-144 - Leo Pruijt, Wiebe Wiersema:
Software architecture reconstruction and compliance checking: a case study. 145-151 - Tobias Olsson, Morgan Ericsson, Anna Wingkvist:
The relationship of code churn and architectural violations in the open source software JabRef. 152-158 - Metin Altinisik, Ersin Ersoy, Hasan Sözer:
Evaluating software architecture erosion for PL/SQL programs. 159-165 - Sandra Schröder, Matthias Riebisch:
Architecture conformance checking with description logics. 166-172 - Najd Altoyan, Dewayne E. Perry:
Towards a well-formed software architecture analysis. 173-179 - Andreas Morgenstern, Pablo Oliveira Antonino, Thomas Kuhn, Patrick Pschorn, Benno Kallweit:
Modeling embedded systems using a tailored view framework and architecture modeling constraints. 180-186
Third workshop on sustainable architecture: global collaboration, requirements, analysis (SAGRA 2017)
- Tiago Volpato, Brauner R. N. Oliveira, Lina Maria Garcés Rodriguez, Rafael Capilla, Elisa Yumi Nakagawa:
Two perspectives on reference architecture sustainability. 188-194 - Justus Bogner, Stefan Wagner, Alfred Zimmermann:
Towards a practical maintainability quality model for service-and microservice-based systems. 195-198 - Ahmed D. Alharthi, Maria Spichkova:
Green architecture for sustainable eLearning systems. 199-204 - Daniel-Jesus Munoz, Mónica Pinto, Lidia Fuentes:
Green software development and research with the HADAS toolkit. 205-211
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.