Academia.eduAcademia.edu

Reference Architecture

description2,131 papers
group661 followers
lightbulbAbout this topic
Reference Architecture is a standardized framework that provides a proven template for designing and implementing systems or solutions within a specific domain. It outlines best practices, components, and relationships, serving as a guide for architects and developers to ensure consistency, interoperability, and efficiency in system development.
lightbulbAbout this topic
Reference Architecture is a standardized framework that provides a proven template for designing and implementing systems or solutions within a specific domain. It outlines best practices, components, and relationships, serving as a guide for architects and developers to ensure consistency, interoperability, and efficiency in system development.
In this paper, we present an improved biometric identity based encryption scheme which is based on Baek et al's scheme. By using fuzzy extractor to construct the public key of a user, we reduce the number of exponentiations of encryption... more
Many industries, such as manufacturing, aviation, and power generation, employ sensitive measurement devices to be calibrated by certified experts. The diversity and sophistication of measurement devices and their calibration needs... more
Firmen verwenden moderne Software-Applikationen häufig, um Aufgaben des täglichen Geschäftsalltags zu organisieren und unterstützend abzuarbeiten. Mitarbeitern wird dadurch die Möglichkeit gegeben miteinander Computer-unterstützt an... more
A group signature scheme allows any group member to sign on behalf of the group in an anonymous and unlinkable fashion. In the event of a dispute, a designated trusted entity can reveal the identity of the signer. In this paper we propose... more
Our extensive research has indicated that high-school teachers are reluctant to make use of existing instructional educational software . Even software developed in a partnership between a teacher and a software engineer is unlikely to be... more
As software architecture is becoming an important asset in the development of software systems, the study of quantitative assessment of software architectures is gaining importance due to its role in assessing their quality. Error... more
The delayed delivery of the AIRBUS A380© demonstratest he challenges to be faced in the field ofc ross-company collaboration today. On the one hand, available CWE platforms are used insufficiently. On the other hand, they do not yet... more
With the ever-increasing volume of data and the demand to analyze and comprehend it, graph processing has become an essential approach for solving complex problems in various domains, like social networks, bioinformatics, and finance.... more
As enterprises explore integrating AI-driven functionality into existing infrastructure, the dominance of Python in the AI ecosystem presents integration challenges for systems based on statically typed platforms such as .NET Core 8. This... more
The internetwork system between Future IP Networks and ZigBee Wireless Networks has two main approaches; the SIP Proxy Based approach, and the ZigBee Stack Based approach. Because of the dynamic nature of the ZigBee devices, both... more
Software architecture allows us to make many decisions about a software system and analyze it even before it has been implemented, so as to make planned development possible. Similarly, architecture-based software evolution planning makes... more
Cloud computing may well become one of the most transformative technologies in the history of computing. Cloud service providers and customers have yet to establish adequate forensic capabilities that could support investigations of... more
This article presents a model for describing the architecture of software-intensive systems, based on the use of multiple, concurrent views. This use of multiple views allows to address separately the concerns of the various... more
Nowadays, governments are facing new opportunities to streamline their processes through e-Government initiatives. Although organizations already seek to manage their information through information systems, it is also essential to... more
Software architectures are often claimed to be robust. However, there is no explicit and concrete definition of software architecture robustness. This paper gives a definition of software architecture robustness and presents a set of... more
Design combinatorial theory for test-case generation has been used successfully in the past. It is useful in optimizing test cases as it is practically impossible to exhaustively test any software system. The same concept can be applied... more
Software evolution is inevitable due to changes in requirements and technology. Software quality and productivity are critical to software evolution. Architecture-centric evolution has the advantage of improving quality attributes;... more
With the rise of virtualization technologies and the rapid advancement of cloud computing, serverless architectures have emerged as a transformative paradigm for building scalable, cost-efficient, and event-driven applications without the... more
For large component-based applications, identifying a valid deployment architecture has emerged as a major challenge. Actually, this deployment architecture (i.e, allocation of software components to its hardware hosts) should satisfy... more
In the literature of software engineering, many approaches have been proposed for the recovery of software architectures. These approaches propose to group classes into highly-cohesive and looselycoupled clusters considered as... more
Architecture constraints are specifications which enable developers to formalize design rules that architectures should respect, like the topological conditions of a given architecture pattern or style. These constraints can serve as a... more
Component-based software engineering provides for developers the ability to easily reuse and assemble software entities to build complex software. Component-based specification of software functionality has been and is largely addressed,... more
o direito, perpétuo e sem limites geográficos, de arquivar e publicar esta dissertação através de exemplares impressos reproduzidos em papel ou de forma digital, ou por qualquer outro meio conhecido ou que venha a ser inventado, e de a... more
Understanding quality attributes relationships impersonates a vital role in sustaining a sufficient level of quality to a software system. Furthermore, calibrating the relationships between system's quality attributes will not only... more
Architecture description languages are used to describe both the hardware and software architecture of an application, at system-level. The basic software components are intended to be developed independently, and then deployed on the... more
Officially standardized by the International Telecommunication Union (ITU) as IMT-2020 and specified by the 3rd Generation Partnership Project (3GPP) starting from Release 15, the fifth generation of mobile telephony (5G) marks a... more
The fifth generation of mobile networks (5G) represents a paradigm shift in telecommunications, promising transformative capabilities through enhanced Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communications (URLLC), and... more
In this paper, a permutation scheme is introduced for Distributed Video Coding. The main goal is to preserve privacy and security in video surveillance video communications and can be adapted for other scenarios. The proposed approach... more
Nowadays, governments are facing new opportunities to streamline their processes through e-Government initiatives. Although organizations already seek to manage their information through information systems, it is also essential to... more
Group signature schemes existentially provide anonymity, non-repudiation and can make a mobile device untraceable. But using group signature only in designing anonymous key exchange system is time wasting and consumes much of other... more
We propose a simplified but efficient scenario for a manned Mars mission. The idea is to select a crew of only 2 astronauts and to bring in situ resource utilization systems in the same vehicle. For security reasons, we suggest... more
A new technique of spatio-temporal scalability coding is considered for video with bitrates of order of megabits per second. Both temporal and spatial resolutions are reduced for data transmitted in a base layer. The temporal resolution... more
Cloud Computing is one of the most pervasive ICT changes of the last few years. Usually, Clouds offer a variety of Services, which are accessible over the Internet. These Services are regulated by some contracts called Service Level... more
In 2015, NASA Goddard Space Flight Center (GSFC) reinvigorated the development of the TDRSS Augmentation Service for Satellites (TASS). TASS is a global, space-based, communications and navigation service for users of Global Navigation... more
Real-time data processing has emerged as a cornerstone of modern cloud applications, necessitating innovative architectural designs. This paper presents an event-driven cloud architecture tailored for handling dynamic workloads and... more
In cloud-native and distributed computing environments, traditional methods of identity and access management have become insufficient due to the dynamic nature of workloads and the increasing need for zero trust security models.... more
We present the RAGS (Reference Architecture for Generation Systems) framework: a specification of an abstract Natural Language Generation (NLG) system architecture to support sharing, re-use, comparison and evaluation of NLG technologies.... more
This live demonstration will involve spoken conversational interaction over the telephone with a system that provides information about a set of nearly 1000 restaurants in the Greater Boston area. Several aspects of our recent research in... more
This memo describes the privacy in mobility and multi-homing problem statement. Haddad et al. Expires March 2005 [Page 1] INTERNET-DRAFT MoMiPriv Problem Statement October 2004
The ordinary stereo image of an object consists of data of left and right views. Therefore, the left and right image pairs have to be transmitted simultaneously in order to display 3-dimentional video at the remote site. However, due to... more
The profound, pervasive and enduring consequences of ageing population present enormous challenges as well as enormous opportunities for Information and Communication Technology. The EU funded OASIS project, a Large Scale Integrated... more
This paper presents the cloud computing environment setup without any prior experience with the cloud. It provides a good understanding of concepts like virtualization, Kubernetes, Databases and Compute Engines it also discusses what... more
Design-time evaluation is essential to build the initial software architecture to be deployed. However, experts’ assumptions made at design-time are unlikely to remain true indefinitely in systems that are characterized by scale,... more
The Data Warehouse system has two main architectures, the first is called the data flow architecture, and the second is called the device architecture. The data flow architecture is concerned with describing the storage data warehouse in... more
The Specification and Description Language (SDL) and Message SequenceCharts (MSC) are formal description techniques which gain moreand more importance in the development and specification of complexreal-time systems, especially in the... more
Download research papers for free!