Sciweavers

700 search results - page 64 / 140
» Enterprise Computing
Sort
View
GI
2005
Springer
14 years 3 months ago
RFID middleware design - addressing both application needs and RFID constraints
: Radio Frequency Identification (RFID) technology has a lot of potential to bridge the gap between the virtual world of enterprise IT systems and the real world of products and l...
Christian Floerkemeier, Matthias Lampe
CSE
2009
IEEE
13 years 11 months ago
Integrity Verification of Outsourced XML Databases
Recent years have witnessed an increasing trend of enterprises outsource their IT services to third parties. A major concern in database outsourcing paradigm is integrity verificat...
Ruilin Liu, Hui Wang
CCGRID
2010
IEEE
13 years 11 months ago
A Capabilities-Aware Programming Model for Asymmetric High-End Systems
In this research, we investigate and address the challenges of asymmetry in High-End Computing (HEC) systems comprising heterogeneous architectures with varying I/O and computation...
M. Mustafa Rafique
ICAC
2007
IEEE
14 years 4 months ago
A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications
— The multi-tier implementation has become the industry standard for developing scalable client-server enterprise applications. Since these applications are performance sensitive...
Qi Zhang, Ludmila Cherkasova, Evgenia Smirni
ECOOP
2000
Springer
14 years 2 months ago
Distributed Asynchronous Collections: Abstractions for Publish/Subscribe Interaction
ions for Publish/Subscribe Interaction Patrick Th. Eugster1 , Rachid Guerraoui1 , and Joe Sventek2 1 Swiss Federal Institute of Technology, Lausanne 2 Agilent Laboratories Scotland...
Patrick Th. Eugster, Rachid Guerraoui, Joe Sventek