Sciweavers

8503 search results - page 1536 / 1701
» Secure Software Architectures
Sort
View
ECBS
2007
IEEE
209views Hardware» more  ECBS 2007»
14 years 3 months ago
Aspect-Oriented Modeling of Ubiquitous Web Applications: The aspectWebML Approach
Ubiquitous web applications (UWA) are required to be customizable, meaning their services need to be adaptable towards the context of use, e.g., user, location, time, and device. ...
Andrea Schauerhuber, Manuel Wimmer, Wieland Schwin...
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 3 months ago
A Survey of B2B Methodologies and Technologies: From Business Models towards Deployment Artifacts
Abstract— In recent years business-to-business (B2B) ecommerce has been subject to major rethinking. A paradigm shift from document centric file-based interchange of business in...
Jürgen Dorn, Christoph Grün, Hannes Wert...
HICSS
2007
IEEE
124views Biometrics» more  HICSS 2007»
14 years 3 months ago
POSAML: A Visual Modeling Framework for Middleware Provisioning
Effective provisioning of next generation distributed applications hosted on diverse middleware platforms incurs significant challenges due to the applications’ growing complex...
Dimple Kaul, Arundhati Kogekar, Aniruddha S. Gokha...
ICAC
2007
IEEE
14 years 3 months ago
SLA Decomposition: Translating Service Level Objectives to System Level Thresholds
In today’s complex and highly dynamic computing environments, systems/services have to be constantly adjusted to meet Service Level Agreements (SLAs) and to improve resource uti...
Yuan Chen, Subu Iyer, Xue Liu, Dejan S. Milojicic,...
ICDCS
2007
IEEE
14 years 3 months ago
Fault Tolerance in Multiprocessor Systems Via Application Cloning
Record and Replay (RR) is a software based state replication solution designed to support recording and subsequent replay of the execution of unmodified applications running on mu...
Philippe Bergheaud, Dinesh Subhraveti, Marc Vertes
« Prev « First page 1536 / 1701 Last » Next »