Sciweavers

690 search results - page 87 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
121
Voted
CAISE
2001
Springer
15 years 8 months ago
Coordination Technologies for Managing Information System Evolution
Information System Engineering has become under increasing pressure to come up with software solutions that endow systems with the agility that is required to evolve in a continual...
Luis Filipe Andrade, José Luiz Fiadeiro
IJWIN
2002
166views more  IJWIN 2002»
15 years 3 months ago
QoS Routing for Mesh-Based Wireless LANs
Wireless LANs with their increased data rate become an attractive technology for connecting mobile users to the Internet. Efficient deployment of wireless LANs will require the ab...
Qi Xue, Aura Ganz
MOBISYS
2007
ACM
16 years 3 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...
109
Voted
HPCA
2006
IEEE
16 years 4 months ago
Retention-aware placement in DRAM (RAPID): software methods for quasi-non-volatile DRAM
Measurements of an off-the-shelf DRAM chip confirm that different cells retain information for different amounts of time. This result extends to DRAM rows, or pages (retention tim...
Ravi K. Venkatesan, Stephen Herr, Eric Rotenberg
133
Voted
GG
2004
Springer
15 years 9 months ago
Workshop on Graph-Based Tools
Graphs are well-known, well-understood, and frequently used means to depict networks of related items. They are successfully used as the underlying mathematical concept in various ...
Tom Mens, Andy Schürr, Gabriele Taentzer