Sciweavers

1477 search results - page 185 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
GCA
2008
13 years 10 months ago
Anomaly Detection and its Application in Grid
- Size and complexity of grid computing systems increase rapidly. Failures can have adverse effect on application executing on the system. Thus, failure information should be provi...
Thuy Nguyen, Thanh Do, Dung Nguyen, Hiep Nguyen, T...
ICWS
2007
IEEE
13 years 10 months ago
Guarding Sensitive Information Streams through the Jungle of Composite Web Services
Complex and dynamic web service compositions may introduce unpredictable and unintentional sharing of security-sensitive data (e.g., credit card numbers) as well as unexpected vul...
Jinpeng Wei, Lenin Singaravelu, Calton Pu
MODELLIERUNG
2008
13 years 10 months ago
Integrating Template-Based Code Generation into Graphical Model Transformation
Abstract: Model transformation is not only a crucial but also one of the most complicated aspects of model-driven software development (MDSD). An adequate transformation language i...
Martin Girschick
CADUI
2004
13 years 10 months ago
A Lightweight Experiment Management System for Handheld Computers
: This paper describes a system that helps HCI practitioners and researchers manage and conduct experiments involving context-sensitive handheld applications, particularly related ...
Philip D. Gray, Joy Goodman, James Macleod
NETWORKING
2004
13 years 10 months ago
On the Feasibility of Integrated MPEG Teleconference and Data Transmission, over IEEE 802.11 WLANs
The most widespread Wireless Local Area Networks (WLANs) are based today on the IEEE 802.11 standard and its various versions, especially the IEEE 802.11b. In this article we first...
Ioannis Broustis, Michael Paterakis