Sciweavers

18094 search results - page 3599 / 3619
» The Architecture of Secure Systems
Sort
View
SSR
2001
73views more  SSR 2001»
13 years 11 months ago
XML implementation of frame processor
A quantitative study has shown that frame technology [1] supported by Fusion toolset can lead to reduction in time-tomarket (70%) and project costs (84%). Frame technology has bee...
Tak Wong, Stan Jarzabek, Soe Myat Swe, Ru Shen, Ho...
USITS
2001
13 years 11 months ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...
COOTS
1998
13 years 11 months ago
The Design and Performance of MedJava
The Java programming language has gained substantial popularity in the past two years. Java's networking features, along with the growing number of Web browsers that execute J...
Prashant Jain, Seth Widoff, Douglas C. Schmidt
PUK
2000
13 years 11 months ago
Scheduling in a Planning Environment
In a real planning problem, there exists a set of constraints (both temporal constraints and resource usage constraints) which must be satisfied in order to obtain a feasible plan....
Antonio Garrido Tejero, Miguel A. Salido, Federico...
WSC
1998
13 years 11 months ago
Applying Temporal Databases to HLA Data Collection and Analysis
The High Level Architecture (HLA) for distributed simulations was proposed by the Defense Modeling and Simulation Office of the Department of Defense (DOD) in order to support int...
Thom McLean, Leo Mark, Margaret L. Loper, David Ro...
« Prev « First page 3599 / 3619 Last » Next »