Sciweavers

7329 search results - page 1347 / 1466
» Software Architectural Transformation
Sort
View
135
Voted
IADIS
2004
15 years 5 months ago
Speculative TCP Connection Admission Using Connection Migration in Cluster-Based Servers
This paper presents speculative TCP connection admission, a mechanism for improving sub-optimal request distribution decisions in cluster-based servers. Overloaded server nodes in...
Vlad Olaru, Walter F. Tichy
116
Voted
IASTEDSEA
2004
15 years 5 months ago
A framework for early robustness assessment
Time pressure and quality issues bring new challenges for developing web-based systems. The ability to analyze quality early in the development life cycle is crucial. Among the te...
Jianyun Zhou, Tor Stålhane
145
Voted
ACSW
2003
15 years 5 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
125
Voted
FLAIRS
2001
15 years 5 months ago
An Intelligent Interface for Keyboard and Mouse Control -- Providing Full Access to PC Functionality via Speech
SUITEKeys is a speech user interface for motor-disabled computer users. This interface provides access to all available functionality of a computer by modeling interaction at the ...
Bill Z. Manaris, Renée A. McCauley, Valanne...
129
Voted
IAAI
2003
15 years 5 months ago
Secure Mobile Agents on Ad Hoc Wireless Networks
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wirel...
Evan Sultanik, Donovan Artz, Gustave Anderson, Mos...
« Prev « First page 1347 / 1466 Last » Next »