Sciweavers

8623 search results - page 1560 / 1725
» Software engineering for secure systems
Sort
View
WAN
1998
Springer
14 years 1 months ago
The NRW Metacomputing Initiative
In this paper the Northrhine-Westphalian metacomputing initiative is described. We start by discussing various general aspects of metacomputing and explain the reasons for founding...
Uwe Schwiegelshohn, Ramin Yahyapour
WWW
2008
ACM
14 years 10 months ago
Investigating web services on the world wide web
Searching for Web service access points is no longer attached to service registries as Web search engines have become a new major source for discovering Web services. In this work...
Eyhab Al-Masri, Qusay H. Mahmoud
ICSE
2007
IEEE-ACM
14 years 3 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...
JUCS
2008
161views more  JUCS 2008»
13 years 9 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...
OOPSLA
2004
Springer
14 years 3 months ago
AJEER: an aspectJ-enabled eclipse runtime
There are a number of technologies designed to improve modularity in software systems. The technique presented here combines two of them seamlessly to exploit their respective ben...
Martin Lippert
« Prev « First page 1560 / 1725 Last » Next »