Sciweavers

3686 search results - page 50 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
CCGRID
2006
IEEE
14 years 21 days ago
Building Cyberinfrastructure for Bioinformatics Using Service Oriented Architecture
-- Cyberinfrastructure makes the development and deployment of bioinformatics applications easier by providing the framework and components that may be loosely coupled using servic...
Wilfred W. Li, Sriram Krishnan, Kurt Mueller, Kohe...
CASCON
1997
208views Education» more  CASCON 1997»
13 years 10 months ago
An architectural approach to building systems from COTS software components
As software systems become increasingly complex to build developers are turning more and more to integrating pre-built components from third party developers into their systems. T...
Mark R. Vigder, John C. Dean
ADBIS
1998
Springer
180views Database» more  ADBIS 1998»
14 years 1 months ago
Designing Persistence for Real-Time Distributed Object Systems
An implementation of persistent object store for real-time systems with strict processing time constraints is a challenging task, because many traditional database techniques, e.g....
Igor Nekrestyanov, Boris Novikov, Ekaterina Pavlov...
GECCO
2004
Springer
148views Optimization» more  GECCO 2004»
14 years 2 months ago
A Multi-objective Approach to Configuring Embedded System Architectures
Portable embedded systems are being driven by consumer demands to be thermally efficient, perform faster, and have longer battery life. To design such a system, various hardware un...
James Northern III, Michael A. Shanblatt
CN
2007
179views more  CN 2007»
13 years 9 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour