Sciweavers

3089 search results - page 413 / 618
» services 2008
Sort
View
120
Voted
ISORC
2008
IEEE
15 years 10 months ago
Scenario Based Evaluation
The concept of a scenario has long been utilized in military procurement as a means of evaluating capability in an operational context. With the advent of initiatives such as the ...
Nik Looker, David Webster, Duncan Russell, Jie Xu
138
Voted
IWPC
2008
IEEE
15 years 10 months ago
Re-Engineering a Reverse Engineering Portal to a Distributed SOA
REportal is an existing web-based reverse engineering portal web site that provides access to a suite of reverse engineering and program comprehension tools via a web This abstrac...
William M. Mongan, Maxim Shevertalov, Spiros Manco...
133
Voted
MUE
2008
IEEE
144views Multimedia» more  MUE 2008»
15 years 10 months ago
Toward a Message-Oriented Application Model and its Middleware Support in Ubiquitous Environments
Context-awareness has become a distinguishing feature of Ubiquitous systems. Contrary to desktop and web applications, Ubiquitous applications gather environmental context and pro...
Chun-Feng Liao, Ya-Wen Jong, Li-Chen Fu
NCA
2008
IEEE
15 years 10 months ago
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems
In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused...
Giuliana Santos Veronese, Miguel Correia, Lau Cheu...
NOMS
2008
IEEE
131views Communications» more  NOMS 2008»
15 years 10 months ago
Availability "weak point" analysis over an SOA deployment framework
— Availability is one of the important factors to be considered for business-driven IT service management. This paper addresses the issue of analyzing what we call availability w...
Lei Xie, Jing Luo, Jie Qiu, John A. Pershing, Ying...