Sciweavers

4330 search results - page 743 / 866
» Analyzing security architectures
Sort
View
ICNS
2008
IEEE
15 years 10 months ago
Enhancing User-Service Interaction through a Global User-Centric Approach to SOA
Considered as enablers of seamless application-toapplication integration both within company boundaries and on a global scale, Web Services-based SOAs have traditionally focused o...
Javier Soriano, David Lizcano, Juan José Hi...
127
Voted
IPPS
2008
IEEE
15 years 10 months ago
Financial modeling on the cell broadband engine
High performance computing is critical for financial markets where analysts seek to accelerate complex optimizations such as pricing engines to maintain a competitive edge. In th...
Virat Agarwal, Lurng-Kuo Liu, David A. Bader
124
Voted
SASO
2008
IEEE
15 years 10 months ago
Nature-Inspired Spatial Metaphors for Pervasive Service Ecosystems
Innovative paradigms and frameworks have to be identified to enable the effective deployment and execution of pervasive computing services. Such frameworks must be conceived so a...
Cynthia Villalba, Alberto Rosi, Mirko Viroli, Fran...
141
Voted
SBACPAD
2008
IEEE
170views Hardware» more  SBACPAD 2008»
15 years 10 months ago
Using Analytical Models to Efficiently Explore Hardware Transactional Memory and Multi-Core Co-Design
Transactional memory is emerging as a parallel programming paradigm for multi-core processors. Despite the recent interest in transactional memory, there has been no study to char...
James Poe, Chang-Burm Cho, Tao Li
149
Voted
WCNC
2008
IEEE
15 years 10 months ago
Neural Network-Based Approach for Adaptive Density Control and Reliability in Wireless Sensor Networks
A primary constraint in wireless sensor networks (WSNs) is obtaining reliable and prolonged network operation with power-limited sensor nodes. Most of the approaches to the energy ...
Renita Machado, Sirin Tekinay