Skip to main content

Architecture Reasoning for Supporting Product Line Evolution: An Example on Security

  • Chapter
Software Product Lines

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abowd, G., Goel, A., Jerding, D., McCracken, M., Moore, M., Murdock, W., Potts, C., Rugaber, S., Wills, L.: MORALE: mission oriented architectural legacy evolution. Proceedings of the International Conference on Software Maintenance’97, Bari, Italy, 29 September-3 October 1997

    Google Scholar 

  2. Alonso, A., León, G., Dueñas, J.C., de la Puente, J.A.: Framework for documenting design decisions in product families development. Proceedings of the 3rd IEEE International Conference on Engineering of Complex Computer Systems (IEEE Computer Society, Silver Spring, MD 1997)

    Google Scholar 

  3. Anderson, P. et al: Design and implementation of a fine-grained software inspection tool. IEEE Trans. Softw. Eng. 29(8) (August 2003)

    Google Scholar 

  4. Apache community: http://www.apache.org

  5. ARES Project: Architectural reasoning for embedded systems. ESPRIT 20477, 1995-1998. http://www. infosys.tuwien.ac.at/staff/hg/projects/ARES/

  6. Bachmann, F., Bass, L.: Managing Variability in Software Architectures (2003)

    Google Scholar 

  7. Beanome: http://www-adele.imag.fr/∼cervante/projects.html

  8. Bosch, J.: Design and Use of Software Architectures -- Adapting and Evolving a Product Line Approach (ACM/Addison-Wesley, New York/Reading, MA 2000)

    Google Scholar 

  9. Boucetta, S., Hadjami Ben Ghezala, H., Kamoun, F.: Architectural recovery and evolution of large leg-acy systems. Proceedings of IWPSE99 International Workshop on the Principles of Software Evolution, Japan, 16-17 July 1999

    Google Scholar 

  10. Bouncy Castle: http://www.bouncycastle.org/

  11. Bowman, T., Holt, R.C., Brewster, N.V.: Linux as a case study: its extracted software architecture. Proceed-ings of the 21st International Conference on Software Engineering, Los Angeles, CA, 16-22 May, 1999 (ACM, New York 1999) pp 555-563

    Google Scholar 

  12. Bril, R.J., Feijs, L., Glas, A., Krikhaar, R.L., Winter, T.: Hiding expressed using relation algebra with mul-tirelations-oblique lifting and lowering for unbalanced systems. Proceedings of the 4th European Workshop on Software Maintenance and Reengineering, 29 February-3 March 2000 (2000)

    Google Scholar 

  13. CAFÉ ITEA Project: From concepts to application in system family engineering (CAFÉ) is a project under Eureka 2023 programme, ip00004, 2001-2003. http://www.esi.es/Cafe/

  14. Cerón, R., Arciniegas, J., Ruiz, J., Dueñas, J., Bermejo, J., Capilla, R.: Architectural modelling in product family context. 1st European Workshop on Software Architecture, EWSA 2004, St. Andrews, UK, 21-22 May 2004. Lecture Notes in Computer Science, vol 3047 (Springer, Berlin Heidelberg New York 2004)

    Google Scholar 

  15. Chikofsky, E., Cross, J.: Reverse engineering and design recovery: A taxonomy. IEEE Software pp. 13-17, January 1990

    Google Scholar 

  16. Clements, P., Northrop, L.: Software Product Lines: Practices and Patterns (Addison-Wesley, Reading, MA, 2001)

    Google Scholar 

  17. Common criteria for information technology security evaluation, Part 1: Introduction and general model, version 2.2. http://www.commoncriteriaportal.org/ (2004)

  18. Controlled access protection profile, version 1.d, Information Systems Security Organisation (National Se-curity Agency (NSA), 9800 Savage Road, Fort George G. Meade, MD 20755-6000 October 1999)

    Google Scholar 

  19. Coplien, J., Hoffman, D., Weiss, D.: Commonality and variability in software engineering. IEEE Softw. (November 1998)

    Google Scholar 

  20. De Pauw, W., Mitchell, N., Robillard, M., Sevitsky, G., Srinivasan, H.: Driveby analysis of running pro-grams. Proceedings for Workshop on Software Visualization, International Conference on Software Engi-neering, Toronto, 12-13 May 2001

    Google Scholar 

  21. DMTF: CIM Core Specification 2.9, CIM User schema 2.9 and CIM Network specification 2.9 (UML dia-grams). http://www.dmtf.org (2004)

  22. DMTF: CIM User and Security Model White Paper (2003)

    Google Scholar 

  23. Ducasse, S., Lanza, M., Bertuli, R.: High-level polymetrics views of condensed run-time information. Pro-ceedings of the 8th European Conference on Software Maintenance and Reengineering (IEEE Computer Society, Silver Spring, MD 2004) pp 309-318

    Google Scholar 

  24. Eclipse/Omondo: http://www.omondo.com/

  25. Egyed, A.: Consistent adaptation and evolution of class diagrams during refinement. Proceedings of the 7th International Conference on Fundamental Approaches to Software Engineering (FASE), Barcelona, Spain, March 2004

    Google Scholar 

  26. Egyed, A.: A scenario-driven approach to trace dependency analysis. IEEE Trans. Softw. Eng. 29(2) (Feb-ruary 2003)

    Google Scholar 

  27. Egyed, A., Kruchten, P.: Rose/architecture: a tool to visualize architecture. HICSS 1999. 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 5-8 January 1999

    Google Scholar 

  28. Egyed, A.: Automated abstraction of class diagrams. ACM Trans. Softw. Eng. Meth. 11(4), 449-491 (2002)

    Article  Google Scholar 

  29. Egyed, A.: Compositional and relational reasoning during class abstraction. Proceedings of the 6th Interna-tional Conference on the Unified Modeling Language (UML), San Francisco, USA, October 2003

    Google Scholar 

  30. Eixelsberger, W., Ogris, M., Gall, H., Bellay, B.: Software architecture recovery of a program family. Pro-ceedings of the International Conference on Software Engineering, Kyoto, Japan, April 1998, pp 508-511

    Google Scholar 

  31. El Kaim, W.: System family software architecture glossary, ESAPS, definition and description of system families. http://www.esi.es/esaps (December 2000)

  32. El Kaim, W.: Managing variability in the LCAT SPLIT/Daisy model. 1st Software Product Line Confer-ence, Colorado, 2000

    Google Scholar 

  33. El-Ramly, M., Iglinski, P., Stroulia, E., Sorenson, P., Matichuk, B.: Modeling the system-user dialog using interaction traces. Proceedings of the 8th Working Conference on Reverse Engineering, 2-5 October 2001

    Google Scholar 

  34. Exymen: http://www.exymen.org

  35. FAMILIES ITEA project: FAct-based maturity through institutionalisation lessons-learned and involved exploration of system-family engineering. Eureka 2023 programme, ip02009. 2003-2005. Catalogue of Methods and Processes for System-Family Engineering, ed by by Böckle, G., Wittmann, M. Official Web Site of the FAMILIES Project: http://www.esi.es/Families/E1.4b-Method-Catalogue/Start_SFE_Catalogue. htm

  36. Favre, J.: A new approach to software exploration: backpacking with GSEE. European Conference on Software Maintenance and Reengineering (CSMR’2002) (2002)

    Google Scholar 

  37. Ferenc, R., Beszedes, A., Tarkiainen, M., Gyimothy, T.: Columbus - reverse engineering tool and schema for C++. Proceedings of the International Conference Software Maintenance, 3-6 October 2002

    Google Scholar 

  38. Finnigan, P. et al: The portable bookshelf. IBM Syst. J. 36(4) 564-593 (November 1997)

    Article  Google Scholar 

  39. Flater, D.: Impact of Model-Driven Standards (National Institute of Standards and Technology 2001)

    Google Scholar 

  40. Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns, Elements of Reusable Object-Oriented Software (Addison-Wesley, Reading, MA 1994)

    Google Scholar 

  41. Garlan, D., Shaw, M.: An introduction to software architecture. In: Advances in Software Engineering and Knowledge Engineering, ed by Ambriola, V., Tortora, G. (World Scientific, Singapore 1993) pp 1-39

    Google Scholar 

  42. Gong, L.: A software architecture for open service gateways. Embedded systems. IEEE Internet Comput. (January-February 2001)

    Google Scholar 

  43. Graff, M., van Wyk, K.: Secure Coding, Principles and practices (O’Reilly, USA 2003)

    Google Scholar 

  44. Gravity: http://gravity.sourceforge.net/

  45. Griss, M.: Implementing product-line features by composing component aspects. Proceedings of 1st Inter-national Software Product Line Conference, August 2000

    Google Scholar 

  46. Guo, G., Atlee, J., Kazman, R.: A software architecture reconstruction method. Proceedings of the 1st Working IFIP Conference on Software Architecture (WICSA1), San Antonio, Texas, 22-24 February 1999, pp 225-243

    Google Scholar 

  47. Harris, D.R., Reubenstein, H.B., Yeh, A.S.: Recognizers for extracting architectural features from source code. Proceedings of the 2nd Working Conference on Reverse Engineering (1995)

    Google Scholar 

  48. Harrold, M.J. Testing: a roadmap. In: The Future of Software Engineering, ed by Finkelstein, A. Proceed- ings of ACM ICSE 2000 Conference, 2000, pp 61-72

    Google Scholar 

  49. IEEE: Recommended practice for architectural description of software-intensive systems (September 2000)

    Google Scholar 

  50. IETF Working Group: AAA, authentication, authorization and accounting. http://www.ietf.org/html. charters/aaa-charter.html

  51. IETF: Internet engineering task force. http://www.ietf.org

  52. Institute of Electrical and Electronics Engineers: IEEE Std 1471-2000 (IEEE Computer Society, Silver Spring, MD)

    Google Scholar 

  53. ISO 7498-4: Information processing systems - open systems interconnection - basic reference model – Part 4: management framework, Geneva, 1989

    Google Scholar 

  54. ISO 9126: Software product evaluation: quality characteristics and guidelines for their use. ISO/IEC 9126. (ISO, Geneva, Switzerland 1991)

    Google Scholar 

  55. ISO/IEC JTC1/SC7/WG6 N461: Information technology - software product quality - Part 1: quality model, Part 2: external metrics, Part 3: internal metrics, Part 4: quality in use metrics. ISO/IEC 9126 (November 1999)

    Google Scholar 

  56. ISO/IEC: Information technology - security techniques - entity authentication mechanisms; Part 1: general model. Technical report ISO/IEC 9798-1, 2nd edn (International Organization for Standardization, Genève, Switzerland 1991)

    Google Scholar 

  57. Jacobson, I., Griss, M., Jonsson, P.: Software Reuse, Architecture, Process and Organization for Business Success (Addison-Wesley, Reading, MA 1997)

    Google Scholar 

  58. Jazayeri, M., Ran, A., van der Linden, F.: Software Architecture for Product Families (Addison-Wesley, Reading, MA 2000)

    Google Scholar 

  59. JBones: Java-Based OSGi Native dEployment System. http://jbones.forge.os4os.org/

  60. JCP: Java Community Process. http://www.jcp.org

  61. Jerding, D., Rugaber, S.: Using visualization for architectural localization and extraction. Proceedings of the 4th Working Conference on Reverse Engineering, Amsterdam, the Netherlands, 6-8 October 1997 (IEEE Computer Society, Silver Spring, MD) pp 56-65

    Google Scholar 

  62. John, I., Dörr, J.: Elicitation of requirements from user documentation. 9th International Workshop on Re-quirements Engineering: Foundation for Software Quality, Refsq’03, Klagenfurt/Velden, Austria, 16-17 June 2003

    Google Scholar 

  63. Johnson, R., Foote, B.: Designing reusable classes. J. Object Oriented Program. SIGS 1(5) (June/July 1988)

    Google Scholar 

  64. Kang, K., Cohen, S., Hess, J., Novak, W., Peterson, A.: Feature-oriented domain analysis (FODA) feasibil-ity study. Technical report, CMU/SEI-90-TR21 (November 1990)

    Google Scholar 

  65. Kazman, R., Jeromy, S.: Playing detective: reconstructing software architecture from available evidence. Technical report, CMU/SEI-97-TR-010 (Software Engineering Institute, Carnegie Mellon University, Pitts-burgh October 1997)

    Google Scholar 

  66. Kazman, R., O’Brien, L., Verhoef, C.: Architecture reconstruction guidelines, 2nd edn, CMU/SEI-2002- TR-034

    Google Scholar 

  67. Keepence, B., Mannion, M.: Using patterns to model variability in product families. IEEE Softw. (July 1999)

    Google Scholar 

  68. Klaus, M.: Simplifying code comprehension for legacy code reuse. Wind River Systems. Embedded Dev. J. (April 2002)

    Google Scholar 

  69. Kleppe, A., Warmer, J., Bast, W.: MDA Explained: The Model Driven Architecture™: Practice and Prom- ise (Addison-Wesley, Reading, MA 2003)

    Google Scholar 

  70. KLOCwork insight: http://www.klocwork.com/Accelerator.htm

  71. Koschke, R., Simon, D.: Hierarchical reflexion models. In: Proceedings of the Working Conference on Reverse Engineering (IEEE Computer Society, Silver Spring, MD 2003)

    Google Scholar 

  72. Krikhaar, R.: Software architecture reconstruction, Ph.D. thesis (University of Amsterdam 1999)

    Google Scholar 

  73. Krutchen, P.: The Rational Development Process: An Introduction (Addison-Wesley, Reading, MA 1999)

    Google Scholar 

  74. Laine, P.: The role of software architecture in solving fundamental problems in object-oriented develop-ment of large embedded systems. Proceedings of the Working IEEE/IFIP Conference on Software Architec-ture, Amsterdam, The Netherlands, 28-31 August 2001, pp 14--23

    Google Scholar 

  75. Lamping, J., Rao, R., Pirolli, P.: A Focus+Context technique based on hyperbolic geometry for visualizing large hierarchies. In: Proceedings of the ACM Conference on Human Factor in Computing Systems, Den-ver, 1995

    Google Scholar 

  76. Lane, T.G.: Studying software architecture through design spaces and rules. Technical report, CMU/ SEI-90-TR-18 (Software Engineering Institute 1990)

    Google Scholar 

  77. Lanza, M.: CodeCrawler-lessons learned in building a software visualization tool. Proceedings of the 7th European Conference on Software Maintenance and Reengineering, 26--28 March 2003 (2003)

    Google Scholar 

  78. Linux Security Administrator’s Guide, v0.98, 22 August 1998. http://www.nic.com/∼dave/Security AdminGuide/SecurityAdminGuide.html

  79. McCullagh, A., Caelli, W.: Non-repudiation in the digital environment. First Monday 5(8). Available at http://www.firstmonday.org/issues/issue5_8/mccullagh/index.html (2000)

  80. Mendonça, N., Kramer, J.: Architecture recovery for distributed systems. SWARM Forum at the Eight Working Conference on Reverse Engineering, Stuttgart, Germany, October 2001

    Google Scholar 

  81. Muccini, H. et al: Using software architecture for code testing. IEEE Trans. Softw. Eng. 30(3) (March 2004)

    Google Scholar 

  82. Munson, J., Khoshgoftaar, T.: Measuring dynamic program complexity. IEEE Softw. 48-55 (November 1992)

    Google Scholar 

  83. Murphy, G. et al: Software reflexion models: bridging the gap between design and implementation. IEEE TSE 27(4), 364-380 (April 2001)

    Google Scholar 

  84. Niere, J.: Recovering design elements in large software systems. Proceedings of the 6th Workshop Software Reengineering (WSR), Bad Honnef, Germany, May 2004

    Google Scholar 

  85. Nikora, A.P., Munson, J.C.: Understanding the nature of software evolution. Software maintenance, 2003, ICSM 2003. Proceedings of the International Conference, 22-26 September 2003

    Google Scholar 

  86. OASIS consortium: http://www.oasis-open.org

  87. OASIS Web Services Security TC: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=wss

  88. Obbink, J.H., Kruchten, K.W., Postma, H., Ran, A., Dominick, L., Kazman, R., Hilliard, R., Tracz, W., Kahane, E.: Software architecture review and assessment (SARA) report, version 1.0 (February 2002)

    Google Scholar 

  89. O’Brien, L., Stoermer, C., Verhoef, C.: Software architecture reconstruction: practice needs and current approaches, CMU/SEI-2002-TR-024 ADA407795 (2002)

    Google Scholar 

  90. OMG: Security Service Specification Version 1.8 (March 2002)

    Google Scholar 

  91. OMG: Model driven architecture (MDA) Architecture board ORMSC (9 July 2001)

    Google Scholar 

  92. OMG: Ontology definition Metamodel. Request for proposal (18 August 2003)

    Google Scholar 

  93. OMG: Unified modeling language specification. Object Management Group. Version 1.5 (March 2003)

    Google Scholar 

  94. Oscar: An OSGi framework implementation. http://oscar-osgi.sourceforge.net/

  95. OSGi Service Platform, Release 3. http://www.osgi.org/ (March 2003)

  96. OSMOSE: Open source middleware for open systems in Europe. http://www.itea-osmose.org (2003-2005)

  97. Oya, M.: MDA and system design. Presentation at “MDA Information Day” during the OMG technical meeting (April 2002)

    Google Scholar 

  98. Perry, D.E., Wolf, A.L.: Foundations for the study of software architecture. ACM SIGSOFT Softw. Eng. Notes 17: 40-52 (October 1992)

    Article  Google Scholar 

  99. Pras, A. et al: Internet accounting. IEEE Commun. Mag. (May 2001)

    Google Scholar 

  100. Rilling, J., Lizotte, M.: Position paper: challenges in visualizing and reconstructing architectural views. 2nd IEEE International Workshop on Visualizing Software for Understanding and Analysis, Amsterdam, the Netherlands, 22 September 2003 (IEEE Computer Society, Silver Spring, MD 2003)

    Google Scholar 

  101. Rilling, J., Li, H.F., Goswami, D.: Predicate-based dynamic slicing of message passing programs source code analysis and manipulation, 2002. Proceedings of 2nd IEEE International Workshop, 1 October 2002

    Google Scholar 

  102. Rilling, J., Seffah, A., Bouthlier, C.: The CONCEPT project - applying source code analysis to reduce information complexity of static and dynamic visualization techniques. Visualizing Software for Under-standing and Analysis, 2002. Proceedings of 1st International Workshop, 26 June 2002

    Google Scholar 

  103. Riva, C.: Reverse architecting: an industrial experience report. Proceedings of the 7th Working Conference on Reverse Engineering, Brisbane, Australia, 23-25 November 2000, pp 42-50

    Google Scholar 

  104. Shin, S.: Secure Web services. JavaWorld (2003)

    Google Scholar 

  105. Sartipi, K., Kontogiannis, K.: A graph pattern matching approach to software architecture recovery. Pro-ceedings of the IEEE International Conference on Software Maintenance (ICSM 2001), Florence, Italy, 7-9 November 2001, pp 408-419

    Chapter  Google Scholar 

  106. Selonen, P., Xu, J.: Validation UML models against architectural profiles. ESEC/FSE’03, Helsinki, Finland, 1-5 September 2003

    Google Scholar 

  107. Sevitsky, G., de Pauw, W., Konuru, R.: An information exploration tool for performance analysis of Java programs. Technology of Object-Oriented Languages and Systems, 2001. TOOLS 38. Proceedings, 12-14 March 2001

    Google Scholar 

  108. Shaw, M., Garlan D.: Software Architecture: Perspectives on an Emerging Discipline (Prentice-Hall, Englewood Cliffs, NJ 1996)

    MATH  Google Scholar 

  109. SHriMP Views: http://www.thechiselgroup.org/

  110. Sovio, S., Asokan, N., Nyberg, K.: Defining Authorization Domains Using Virtual Devices (2003)

    Google Scholar 

  111. Stasko, J., Domingue, J., Brown, M.H., Price, B.A. (eds) Software Visualization - Programming as a Multimedia Experience (MIT 1998)

    Google Scholar 

  112. Stoermer, C., O’Brien, L., Verhoef, C.: Practice patterns for architecture reconstruction. Working Confer-ence on Reverse Engineering, Richmond, VA, USA, 29 October-1 November 2002

    Google Scholar 

  113. Storey, M.-A., Best, C., Michaud, J.: SHriMP views: an interactive and customizable environment for soft-ware exploration. Proceedings of International Workshop on Program Comprehension (IWPC’2001), May 2001

    Google Scholar 

  114. Stroulia, E., Systä, T.: Dynamic analysis for reverse engineering and program understanding. Applied Computing Reviews Spring 2002 (ACM, New York 2002)

    Google Scholar 

  115. Stroulia, E., El-Ramly, M., Inglinski, P., Sorenson, P.: User interface reverse engineering in support of interface migration to the Web. Automat. Softw. Eng. 3(1), 271-301 (2003)

    Article  Google Scholar 

  116. Szyperski, C.: Component Software -- Beyond Object-Oriented Programming (Addison-Wesley, Reading, MA, 1998)

    Google Scholar 

  117. Technology Roadmap on Software Intensive Systems: The Vision of ITEA (SOFTEC Project); ITEA Office (March 2001)

    Google Scholar 

  118. The Java Security Architecture for JDK 1.2. Version 1.0, Sun Microsystems, October 1998. http://java.sun. com/products/jdk/1.4/docs/guide/security/spec/securityspec.doc.html

  119. The Portable Bookshelf: http://swag.uwaterloo.ca/pbs/

  120. The Rigi Tool: http://www.rigi.csc.uvic.ca/

  121. Tonella, P., Fiutem, R., Antoniol, G.: Augmenting pattern-based architectural recovery with flow analy-sis: Mosaic - a case study. Proceedings of the Working Conference on Reverse Engineering (IEEE, New York 1996)

    Google Scholar 

  122. van der Linden, F. (ed) Development and Evolution of Software Architectures for Product Families. Pro-ceedings of the 2nd International ESPRIT ARES workshop, Las Palmas de Gran Canaria, Spain, 1998. Lecture Notes in Computer Science, vol 1429 (Springer, Berlin Heidelberg New York 1998)

    Google Scholar 

  123. van der Linden, F.: Software product families in Europe: the ESAPS & CAFÉ projects. IEEE Softw. (July 2002)

    Google Scholar 

  124. Vidacs, L., Beszedes, A., Ferenc, R.: Columbus schema for C/C++ preprocessing software maintenance and reengineering, 2004, CSMR 2004. Proceedings of the 8th European Conference, 24-26 March 2004

    Google Scholar 

  125. W3C: World Wide Web Consortium. http://www.w3.org/Security/

  126. Web Services and SOA; D.K. Barry Mk (2004)

    Google Scholar 

  127. WebOpedia: Online dictionary available in http://www.webopedia.com/

  128. Whittaker, J.: Why secure applications are difficult to write. IEEE Security Privacy (2003)

    Google Scholar 

  129. Wijnstra, J.G.: Component frameworks for a medical imaging product family. In: Software Architectures for Product Families, International Workshop IW-SAPF-3. Lecture Notes in Computer Science, vol 1951 (Springer, Berlin Heidelberg New York 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Arciniegas, J.L., Dueñas, J.C., Ruiz, J.L., Cerón, R., Bermejo, J., Oltra, M.A. (2006). Architecture Reasoning for Supporting Product Line Evolution: An Example on Security. In: Käköla, T., Duenas, J.C. (eds) Software Product Lines. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-33253-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-33253-4_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33252-7

  • Online ISBN: 978-3-540-33253-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics