Sciweavers

8503 search results - page 1561 / 1701
» Secure Software Architectures
Sort
View
AWIC
2003
Springer
14 years 2 months ago
Using Case-Based Reasoning to Improve Information Retrieval in Knowledge Management Systems
Abstract. Complementary to hypertext navigation, classic information retrieval is broadly used to find information on the World Wide Web and on Web-based systems. Among these there...
Norbert Gronau, Frank Laskowski
CIKM
2003
Springer
14 years 2 months ago
HyperThesis: the gRNA spell on the curse of bioinformatics applications integration
In this paper, we describe a graphical workflow management system called HyperThesis to address the challenges of integrating bioinformatics applications. HyperThesis is an integ...
Sourav S. Bhowmick, Vivek Vedagiri, Amey V. Laud
EGH
2003
Springer
14 years 2 months ago
A multigrid solver for boundary value problems using programmable graphics hardware
—We present a method for using programmable graphics hardware to solve a variety of boundary value problems. The time-evolution of such problems is frequently governed by partial...
Nolan Goodnight, Cliff Woolley, Gregory Lewin, Dav...
EMSOFT
2003
Springer
14 years 2 months ago
Schedule-Carrying Code
We introduce the paradigm of schedule-carrying code (SCC). A hard real-time program can be executed on a given platform only if there exists a feasible schedule for the real-time t...
Thomas A. Henzinger, Christoph M. Kirsch, Slobodan...
EMSOFT
2003
Springer
14 years 2 months ago
Event Correlation: Language and Semantics
Abstract. Event correlation is a service provided by middleware platforms that allows components in a publish/subscribe architecture to subscribe to patterns of events rather than ...
César Sánchez, Sriram Sankaranarayan...
« Prev « First page 1561 / 1701 Last » Next »