Sciweavers

44 search results - page 9 / 9
» Portable Resource Control in Java: The J-SEAL2 Approach
Sort
View
TES
2001
Springer
13 years 9 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
OTM
2009
Springer
13 years 11 months ago
TMBean: Optimistic Concurrency in Application Servers Using Transactional Memory
Abstract. In this experience report, we present an evaluation of different techniques to manage concurrency in the context of application servers. Traditionally, using entity beans...
Lucas Charles, Pascal Felber, Christophe Gêt...
AICCSA
2008
IEEE
267views Hardware» more  AICCSA 2008»
13 years 11 months ago
Comprehensive support for management of enterprise applications
During the last decades, performance of available hardware resources constantly increased [15], which enabled the assignment of more and more complex tasks to software systems. As...
Jens Bruhn, Christian Niklaus, Thomas Vogel, Guido...
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
13 years 10 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach