Sciweavers

2517 search results - page 297 / 504
» Secure Deployment of Components
Sort
View
JOT
2007
96views more  JOT 2007»
13 years 9 months ago
Aspect Composition in the Motorola Aspect-Oriented Modeling Weaver
One of the fundamental issues in Aspect-Oriented approaches is aspect-to-aspect interference, which occurs when multiple aspects are deployed jointly such that different compositi...
Jing Zhang, Thomas Cottenier, Aswin van den Berg, ...
JUCS
2007
165views more  JUCS 2007»
13 years 9 months ago
A Cultural Information System Providing e-commerce Web Services, Digital Rights Management and Copyright Protection
: The issue addressed in this paper focuses on the design and implementation of an advanced information system for Cultural Organizations, which serves as a platform for the exploi...
Dimitris K. Tsolis, Spyros Sioutas, Lambros Drosso...
JNSM
2000
74views more  JNSM 2000»
13 years 9 months ago
A Review of Approaches to Developing Service Management Systems
: As service management systems are deployed in an open service market environment, the pressures on their developers to shorten development times and improve the flexibility of sy...
David Lewis
PVLDB
2008
216views more  PVLDB 2008»
13 years 8 months ago
Ad-hoc data processing in the cloud
Ad-hoc data processing has proven to be a critical paradigm for Internet companies processing large volumes of unstructured data. However, the emergence of cloud-based computing, ...
Dionysios Logothetis, Ken Yocum
ISSRE
2010
IEEE
13 years 8 months ago
Change Bursts as Defect Predictors
—In software development, every change induces a risk. What happens if code changes again and again in some period of time? In an empirical study on Windows Vista, we found that ...
Nachiappan Nagappan, Andreas Zeller, Thomas Zimmer...