Sciweavers

8503 search results - page 1427 / 1701
» Secure Software Architectures
Sort
View
AOSD
2003
ACM
14 years 4 months ago
Persistence as an aspect
Persistence - the storage and retrieval of application data from secondary storage media - is often used as a classical example of a crosscutting concern. It is widely assumed tha...
Awais Rashid, Ruzanna Chitchyan
EDBTW
2010
Springer
14 years 3 months ago
Declarative scheduling in highly scalable systems
In modern architectures based on Web Services or Cloud Computing, a very large number of user requests arrive concurrently and has to be scheduled for execution constrained by cor...
Christian Tilgner
COMPSAC
2002
IEEE
14 years 3 months ago
Component Based System Framework for Dynamic B2B Interaction
Business-to-Business (B2B) collaboration is becoming a pivotal way to bring today’s enterprises to success in the dynamically changing e-business environment. Though many busine...
Jinmin Hu, Paul W. P. J. Grefen
DANCE
2002
IEEE
14 years 3 months ago
Design and Evaluation of a High Performance Dynamically Extensible Router
This paper describes the design, implementation and performance of an open, high performance, dynamically extensible router under development at Washington University in St. Louis...
Fred Kuhns, John D. DeHart, Anshul Kantawala, Ralp...
WCRE
2002
IEEE
14 years 3 months ago
Exposing Data-Level Parallelism in Sequential Image Processing Algorithms
As new computer architectures are developed to exploit large-scale data-level parallelism, techniques are needed to retarget legacy sequential code to these platforms. Sequential ...
Lewis B. Baumstark Jr., Linda M. Wills
« Prev « First page 1427 / 1701 Last » Next »