Sciweavers

7475 search results - page 1392 / 1495
» Supporting use case based requirements engineering
Sort
View
178
Voted
TES
2001
Springer
15 years 9 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
PODS
2007
ACM
109views Database» more  PODS 2007»
16 years 4 months ago
What is "next" in event processing?
Event processing systems have wide applications ranging from managing events from RFID readers to monitoring RSS feeds. Consequently, there exists much work on them in the literat...
Walker M. White, Mirek Riedewald, Johannes Gehrke,...
DIM
2009
ACM
15 years 11 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
ISCA
2008
IEEE
132views Hardware» more  ISCA 2008»
15 years 11 months ago
Online Estimation of Architectural Vulnerability Factor for Soft Errors
As CMOS technology scales and more transistors are packed on to the same chip, soft error reliability has become an increasingly important design issue for processors. Prior resea...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
IEEEPACT
2007
IEEE
15 years 11 months ago
The OpenTM Transactional Application Programming Interface
Transactional Memory (TM) simplifies parallel programming by supporting atomic and isolated execution of user-identified tasks. To date, TM programming has required the use of l...
Woongki Baek, Chi Cao Minh, Martin Trautmann, Chri...
« Prev « First page 1392 / 1495 Last » Next »