CT This paper describes experiences from two organizations that have used the Riskit method for risk management in their software projects. This paper presents the Riskit method, t...
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Generic database replication algorithms do not scale linearly in throughput as all update, deletion and insertion (UDI) queries must be applied to every database replica. The thro...
The latest Internet phenomenon is Twitter, a micro-blogging platform that in just a few years has attracted millions of users. With short messages (tweets), following and follower...
Maria Claudia Buzzi, Marina Buzzi, Barbara Leporin...
Flexibility and interoperability make web services well suited for designing highly-customizable reactive service-based applications, that is interactive applications that can be ...
Leen Lambers, Hartmut Ehrig, Leonardo Mariani, Mau...