-
1
-
-
84946125131
-
Service-oriented computing: Concepts, characteristics and directions
-
Proceedings of the Fourth International Conference on. IEEE, 2003
-
M. P. Papazoglou, "Service-oriented computing: Concepts, characteristics and directions," in Web Information Systems Engineering, 2003.5https://dev.otto.de/2015/09/30/on-monoliths-and-microservices/ WISE 2003. Proceedings of the Fourth International Conference on.IEEE, 2003, pp. 3-12.
-
(2003)
Web Information Systems Engineering
, pp. 3-12
-
-
Papazoglou, M.P.1
-
2
-
-
84963831128
-
Evaluating the monolithic and the microservice architecture pattern to deploy web applications in the cloud
-
M. Villamizar, O. Garcs, H. Castro, M. Verano, L. Salamanca, R. Casallas, and S. Gil, "Evaluating the monolithic and the microservice architecture pattern to deploy web applications in the cloud," in Computing Colombian Conference (10CCC), 2015 10th, 2015, pp. 583-590.
-
(2015)
Computing Colombian Conference (10CCC), 2015 10th
, pp. 583-590
-
-
Villamizar, M.1
Garcs, O.2
Castro, H.3
Verano, M.4
Salamanca, L.5
Casallas, R.6
Gil, S.7
-
3
-
-
84922850962
-
Microservices
-
J. Thones, "Microservices," Software, IEEE, vol. 32, no. 1, pp. 116-116, 2015.
-
(2015)
Software, IEEE
, vol.32
, Issue.1
, pp. 116
-
-
Thones, J.1
-
5
-
-
0002487235
-
How do committees invent
-
M. E. Conway, "How do committees invent," Datamation, vol. 14, no. 4, pp. 28-31, 1968.
-
(1968)
Datamation
, vol.14
, Issue.4
, pp. 28-31
-
-
Conway, M.E.1
-
6
-
-
84865688779
-
Soap processing performance and enhancement
-
J. M. Tekli, E. Damiani, R. Chbeir, and G. Gianini, "Soap processing performance and enhancement," Services Computing, IEEE Transactions on, vol. 5, no. 3, pp. 387-403, 2012.
-
(2012)
Services Computing, IEEE Transactions on
, vol.5
, Issue.3
, pp. 387-403
-
-
Tekli, J.M.1
Damiani, E.2
Chbeir, R.3
Gianini, G.4
-
9
-
-
33745103392
-
Feature-driven requirement dependency analysis and high-level software design
-
W. Zhang, H. Mei, and H. Zhao, "Feature-driven requirement dependency analysis and high-level software design," Requirements Engineering, vol. 11, no. 3, pp. 205-220, 2006.
-
(2006)
Requirements Engineering
, vol.11
, Issue.3
, pp. 205-220
-
-
Zhang, W.1
Mei, H.2
Zhao, H.3
-
10
-
-
77950536938
-
A comparison of security requirements engineering methods
-
B. Fabian, S. Gürses, M. Heisel, T. Santen, and H. Schmidt, "A comparison of security requirements engineering methods," Requirements engineering, vol. 15, no. 1, pp. 7-40, 2010.
-
(2010)
Requirements Engineering
, vol.15
, Issue.1
, pp. 7-40
-
-
Fabian, B.1
Gürses, S.2
Heisel, M.3
Santen, T.4
Schmidt, H.5
-
11
-
-
32044433021
-
-
Department of Computing, The Open University, Milton Keynes, UK, Technical Report
-
J. D. Moffett, C. B. Haley, and B. Nuseibeh, "Core security requirements artefacts," Department of Computing, The Open University, Milton Keynes, UK, Technical Report, vol. 23, 2004.
-
(2004)
Core Security Requirements Artefacts
, vol.23
-
-
Moffett, J.D.1
Haley, C.B.2
Nuseibeh, B.3
-
13
-
-
37849041408
-
A framework for characterization and analysis of software system scalability
-
New York, NY, USA: ACM
-
L. Duboc, D. Rosenblum, and T. Wicks, "A framework for characterization and analysis of software system scalability," in Proceedings of the 6th Joint Meeting of ESEC and ACM SIGSOFT Symposium on The Foundations of Software Engineering, ser. ESEC-FSE '07. New York, NY, USA: ACM, 2007, pp. 375-384.
-
(2007)
Proceedings of the 6th Joint Meeting of ESEC and ACM SIGSOFT Symposium on the Foundations of Software Engineering, Ser. ESEC-FSE '07
, pp. 375-384
-
-
Duboc, L.1
Rosenblum, D.2
Wicks, T.3
-
14
-
-
84860008701
-
Testing the scalability of saas applications
-
IEEE
-
W.-T. Tsai, Y. Huang, and Q. Shao, "Testing the scalability of saas applications," in 2011 IEEE International Conference on Service-Oriented Computing and Applications (SOCA). IEEE, 2011, pp. 1-4.
-
(2011)
2011 IEEE International Conference on Service-Oriented Computing and Applications (SOCA)
, pp. 1-4
-
-
Tsai, W.-T.1
Huang, Y.2
Shao, Q.3
-
15
-
-
70349595106
-
Client-side cross-site scripting protection
-
E. Kirda, N. Jovanovic, C. Kruegel, and G. Vigna, "Client-side cross-site scripting protection," computers & security, vol. 28, no. 7, pp. 592-604, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.7
, pp. 592-604
-
-
Kirda, E.1
Jovanovic, N.2
Kruegel, C.3
Vigna, G.4
-
16
-
-
77949879017
-
Automatic creation of sql injection and cross-site scripting attacks
-
IEEE 31st International Conference on.IEEE
-
A. Kieyzun, P. J. Guo, K. Jayaraman, and M. D. Ernst, "Automatic creation of sql injection and cross-site scripting attacks," in Software Engineering, 2009. ICSE 2009. IEEE 31st International Conference on.IEEE, 2009, pp. 199-209.
-
(2009)
Software Engineering, 2009. ICSE 2009
, pp. 199-209
-
-
Kieyzun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
18
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir, "Zero-knowledge proofs of identity," Journal of cryptology, vol. 1, no. 2, pp. 77-94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
19
-
-
0003696305
-
-
Springer Science & Business Media
-
L. Chung, B. A. Nixon, E. Yu, and J. Mylopoulos, Non-functional requirements in software engineering. Springer Science & Business Media, 2012, vol. 5.
-
(2012)
Non-functional Requirements in Software Engineering
, vol.5
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
20
-
-
74349092673
-
Layered architecture revisited 2014; Comparison of research and practice
-
Joint Working IEEE/IFIP Conference on, Sept 2009
-
J. Savolainen and V. Myllarniemi, "Layered architecture revisited 2014; comparison of research and practice," in Software Architecture, 2009 European Conference on Software Architecture. WICSA/ECSA 2009.Joint Working IEEE/IFIP Conference on, Sept 2009, pp. 317-320.
-
Software Architecture, 2009 European Conference on Software Architecture. WICSA/ECSA 2009
, pp. 317-320
-
-
Savolainen, J.1
Myllarniemi, V.2
-
21
-
-
77749268145
-
An approach for visualization and formalization of web service composition
-
WISM 2009. International Conference on, Nov
-
C. Ma and Y. He, "An approach for visualization and formalization of web service composition," in Web Information Systems and Mining, 2009. WISM 2009. International Conference on, Nov 2009, pp. 342-346.
-
(2009)
Web Information Systems and Mining, 2009
, pp. 342-346
-
-
Ma, C.1
He, Y.2
-
22
-
-
38149011410
-
-
Berlin, Heidelberg: Springer Berlin Heidelberg
-
K. Zachos, N. Maiden, X. Zhu, and S. Jones, Discovering Web Services to Specify More Complete System Requirements. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 142-157.
-
(2007)
Discovering Web Services to Specify More Complete System Requirements
, pp. 142-157
-
-
Zachos, K.1
Maiden, N.2
Zhu, X.3
Jones, S.4
-
23
-
-
84956646886
-
Discovering web services to improve requirements decomposition
-
H. Wang, S. Zhou, and Q. Yu, "Discovering web services to improve requirements decomposition," in Web Services (ICWS), 2015 IEEE International Conference on, June 2015, pp. 743-746.
-
(2015)
Web Services (ICWS), 2015 IEEE International Conference On, June
, pp. 743-746
-
-
Wang, H.1
Zhou, S.2
Yu, Q.3
-
24
-
-
79953090430
-
-
Berlin, Heidelberg: Springer Berlin Heidelberg
-
S. Adam, O. Uenalan, and N. Riegel, Is It Beneficial to Match Reusable Services Earlier? Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 136-150.
-
(2011)
Is It Beneficial to Match Reusable Services Earlier?
, pp. 136-150
-
-
Adam, S.1
Uenalan, O.2
Riegel, N.3
|