Sciweavers

8503 search results - page 1585 / 1701
» Secure Software Architectures
Sort
View
DSS
2008
121views more  DSS 2008»
13 years 9 months ago
SpidersRUs: Creating specialized search engines in multiple languages
While small-scale search engines in specific domains and languages are increasingly used by Web users, most existing search engine development tools do not support the development...
Michael Chau, Jialun Qin, Yilu Zhou, Chunju Tseng,...
AES
2006
Springer
106views Cryptology» more  AES 2006»
13 years 9 months ago
A grid-enabled problem solving environment for parallel computational engineering design
This paper describes the development and application of a piece of engineering software that provides a Problem Solving Environment (PSE) capable of launching, and interfacing wit...
C. E. Goodyer, Martin Berzins, Peter K. Jimack, L....
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 9 months ago
Turning Cluster Management into Data Management: A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
JAL
2008
89views more  JAL 2008»
13 years 9 months ago
Experimenting with parallelism for the instantiation of ASP programs
Abstract. In the last few years, the microprocessors technologies have been definitely moving to multi-core architectures, in order to improve performances as well as reduce power ...
Francesco Calimeri, Simona Perri, Francesco Ricca
JOT
2006
113views more  JOT 2006»
13 years 9 months ago
Constraint Validation in Model Compilers
Model transformation has become one of the most focused research field, motivated by for instance the OMG's Model-Driven Architecture (MDA). Metamodeling is a central techniq...
László Lengyel, Tihamer Levendovszky...
« Prev « First page 1585 / 1701 Last » Next »