In this IEEE article, authors Neil Harrison and Paris Avgeriou discuss a pattern-based architecture review (PBAR) process to help with system-wide quality attributes. They also discuss how PBAR approach helps with agile practices like frequent releases, changes for user needs, and lightweight documentation. They illustrate the benefits of PBAR process with a real-world project.
In this IEEE article, authors talks about how a codesign methodology using modeling can benefit exascale computing systems with improved performance, power efficiency, and reliability. The five factors discussed in the codesign process are algorithms, application, programming model, runtime system, and hardware architecture.
In this IEEE article, authors Stephen Yau and Ho An talk about application development using service-oriented architecture and cloud computing technologies. They also discuss application development challenges like security in a multi-tenant environment, quality-of-service monitoring, and mobile computing.
In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 3
In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats based on the dataflow diagrams for assessing and mitigating the security risks. 3
In this IEEE article, author Charlie Miller talks about mobile security vulnerabilities. He discusses how iOS and Android phones can be attacked using mobile malware and drive-by downloads.
In this IEEE article, author John Diamant talks about improving security quality of software applications using techniques like security requirements gap analysis and architectural threat analysis.
In this IEEE article, author Dirk Riehle discusses how commercial software firms can control or steer open source projects to meet their business needs.
In this IEEE article, author Sixto Ortiz Jr. discusses the issues and challenges in cloud computing standardization. He also compares the cloud-computing standards proposed by various organizations. 2
In this IEEE article, authors Bernd Grobauer, Tobias Walloschek and Elmar Stöcker discuss the cloud computing security and cloud-specific vulnerabilities.
In this IEEE article, author Eric Olden discusses an identity fabric that links multiple applications to a single identity to manage the volume of user identities in the cloud. 1
In this IEEE article, Balakrishna Narasimhan and Ryan Nichols discuss results of a survey of organizations with experience using cloud applications and platforms.