Sciweavers

8503 search results - page 1622 / 1701
» Secure Software Architectures
Sort
View
NOMS
2008
IEEE
175views Communications» more  NOMS 2008»
14 years 3 months ago
Analysis of application performance and its change via representative application signatures
Abstract—Application servers are a core component of a multitier architecture that has become the industry standard for building scalable client-server applications. A client com...
Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat,...
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
14 years 3 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
NOCS
2007
IEEE
14 years 3 months ago
On Characterizing Performance of the Cell Broadband Engine Element Interconnect Bus
Abstract – With the rise of multicore computing, the design of onchip networks (or networks on chip) has become an increasingly important component of computer architecture. The ...
Thomas William Ainsworth, Timothy Mark Pinkston
MMM
2007
Springer
212views Multimedia» more  MMM 2007»
14 years 3 months ago
MetaXa - Context- and Content-Driven Metadata Enhancement for Personal Photo Books
Making a photo book as a special gift to your beloved can be very time-consuming. One has to carefully select and arrange the pictures nicely over the pages of a previously bought ...
Susanne Boll, Philipp Sandhaus, Ansgar Scherp, Sab...
LCTRTS
2007
Springer
14 years 3 months ago
Tetris: a new register pressure control technique for VLIW processors
The run-time performance of VLIW (very long instruction word) microprocessors depends heavily on the effectiveness of its associated optimizing compiler. Typical VLIW compiler pha...
Weifeng Xu, Russell Tessier
« Prev « First page 1622 / 1701 Last » Next »