Sciweavers

8503 search results - page 1587 / 1701
» Secure Software Architectures
Sort
View
CORR
2004
Springer
129views Education» more  CORR 2004»
13 years 8 months ago
Runtime Reconfiguration of J2EE Applications
: Runtime reconfiguration considered as "applying required changes to a running system" plays an important role for providing high availability not only of safety- and mi...
Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm H...
JECR
2000
167views more  JECR 2000»
13 years 8 months ago
Commercial Scenarios of Digital Agent Deployment: A Functional Classification
The evolution and commercialization of Web Information Systems (WIS) since 1991 has gradually shifted the focus from basic design issues to feedback analysis, visualization techni...
Arno Scharl, Christian Bauer, Marion Kaukal
IJWIN
2002
166views more  IJWIN 2002»
13 years 8 months ago
QoS Routing for Mesh-Based Wireless LANs
Wireless LANs with their increased data rate become an attractive technology for connecting mobile users to the Internet. Efficient deployment of wireless LANs will require the ab...
Qi Xue, Aura Ganz
CN
1999
156views more  CN 1999»
13 years 8 months ago
Virtual reality movies-real-time streaming of 3D objects
Powerful servers for computation and storage, high-speed networking resources, and high-performance 3D graphics workstation, which are typically available in scientific research e...
Stephan Olbrich, Helmut Pralle
TCS
2002
13 years 8 months ago
CASL: the Common Algebraic Specification Language
The Common Algebraic Specification Language Casl is an expressive language for the formal specification of functional requirements and modular design of software. It has been desi...
Egidio Astesiano, Michel Bidoit, Hélè...
« Prev « First page 1587 / 1701 Last » Next »