Sciweavers

2517 search results - page 404 / 504
» Secure Deployment of Components
Sort
View
ECRTS
2005
IEEE
14 years 2 months ago
Non-blocking Deterministic Replacement of Functionality, Timing, and Data-Flow for Hard Real-Time Systems at Runtime
Embedded systems are usually an integral component of a larger system and are used to control and/or directly monitor this system by using special hardware devices. The complexity...
Sebastian Fischmeister, Klemens Winkler
HICSS
2005
IEEE
131views Biometrics» more  HICSS 2005»
14 years 2 months ago
It's More than Just Use: An Investigation of Telemedicine Use Quality
Many information systems (IS) studies portray use as an indicator of system success. However, “simply saying that more use will yield more benefits without considering the natur...
Cynthia LeRouge, Alan R. Hevner
ICAS
2005
IEEE
143views Robotics» more  ICAS 2005»
14 years 2 months ago
Approaches to P2P Internet Application Development
Research in overlay and P2P networking has been tightly focused on fundamentals in the last few years, leading to developments on a range of important issues. The time has come to...
Thabotharan Kathiravelu, Arnold Pears
WISE
2005
Springer
14 years 2 months ago
Decomposition-Based Optimization of Reload Strategies in the World Wide Web
Web sites, Web pages and the data on pages are available only for specific periods of time and are deleted afterwards from a client’s point of view. An important task in order t...
Dirk Kukulenz
SAC
2005
ACM
14 years 2 months ago
Pollock: automatic generation of virtual web services from web sites
As the usage of Web Services proliferates dramatically, new tools to help quickly generate web services are needed. In this paper, we propose a methodology that helps to automatic...
Yi-Hsuan Lu, Yoojin Hong, Jinesh Varia, Dongwon Le...