Software evolution and reuse is more likely to receive higher payoff if high-level artifacts—such as architectures and designs—can be reused and can guide low-level component reuse. In practice, however , high-level artifacts are often not appropriately captured. This paper presents an approach to capturing and assessing software architectures for evolution… (More)
1 Abstract Software architectures are often claimed to be robust. However, there is no explicit and concrete definition of software architecture robustness. This paper gives a definition of software architecture robustness and presents a set of architecture metrics that were applied to real-time telecommunications software for the evaluation of robustness.… (More)
to SA/RT by means of High-Level timed Petri Nets " , The international journal of time critical computing systems,  Department of Defense (DoD): Procedures of performing a failure mode, effects and criticality analysis. DoD, MIL_-STD_1629A.
Depth First Search (DFS) and position-based routing algorithms were proposed in literature. These are localised algorithms that guarantee the delivery for connected ad hoc and sensor wireless networks modelled by arbitrary graphs, including inaccurate location information for a destination node. This article first optimises an existing DFS-based routing… (More)
Most existing network layer protocols in ad hoc and sensor networks require the use of topological or geographical knowledge of neighboring nodes in order to make proper decisions. Such protocols obtain this knowledge following the unit disk graph model, whereby two nodes are neighbors if and only if the distance between them is at most R, where R is the… (More)