Sciweavers

7741 search results - page 1431 / 1549
» Security in Active Networks
Sort
View
MOBIDE
2003
ACM
15 years 9 months ago
Semantically driven service interoperability for pervasive computing
The common vision of pervasive computing environments requires a very large range of devices and software components to interoperate seamlessly. From the assumption that these dev...
Declan O'Sullivan, David Lewis
AP2PC
2003
Springer
15 years 9 months ago
P2P MetaData Search Layers
Distributed Hashtables (DHTs) provide a scalable method of associating file-hashes with a particular location in a distributed network environment. Modifying DHTs directly to suppo...
Sam Joseph
CAEPIA
2003
Springer
15 years 9 months ago
A Document-Oriented Approach to the Development of Knowledge Based Systems
ADDS (Approach to Document-based Development of Software) is an approach to the development of applications based on a document-oriented paradigm. According to this paradigm, appli...
José Luis Sierra, Baltasar Fernández...
CBSQ
2003
Springer
15 years 9 months ago
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability
The use of formal model based (FMB) methods to evaluate the quality of the components is an important research area. Except for a growing number of exceptions, FMB methods are sti...
Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon
HPDC
2002
IEEE
15 years 9 months ago
Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications
In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. So...
Kavitha Ranganathan, Ian T. Foster
« Prev « First page 1431 / 1549 Last » Next »