Sciweavers

569 search results - page 76 / 114
» Assigning Tasks in a 24-Hour Software Development Model
Sort
View
WOA
2010
13 years 6 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
PODC
2011
ACM
12 years 12 months ago
Robust network supercomputing without centralized control
Internet supercomputing is becoming an increasingly popular means for harnessing the power of a vast number of interconnected computers. This comes at a cost substantially lower t...
Seda Davtyan, Kishori M. Konwar, Alexander A. Shva...
JBCS
2002
102views more  JBCS 2002»
13 years 8 months ago
Configurable Data Integration Middleware System
This paper presents a new approach for generating configured and flexible middleware systems for integration of heterogeneous and distributed data. The configuration is based on t...
Álvaro Cesar P. Barbosa, Fabio Porto, Ruben...
BMCBI
2006
128views more  BMCBI 2006»
13 years 9 months ago
Model-driven user interfaces for bioinformatics data resources: regenerating the wheel as an alternative to reinventing it
Background: The proliferation of data repositories in bioinformatics has resulted in the development of numerous interfaces that allow scientists to browse, search and analyse the...
Kevin L. Garwood, Christopher Garwood, Cornelia He...
ISSTA
2006
ACM
14 years 3 months ago
Towards self-adaptive service-oriented architectures
Web services, service-oriented, and service-discovery architectures help developers solve complex business cases, reduce costs, risks, and time-to-market. The task of developers i...
Giovanni Denaro, Mauro Pezzè, Davide Tosi, ...