After a component based system is developed, it has to be deployed into a target environment. As the system becomes much larger and more complex and the environment becomes open an...
Ling Lan, Gang Huang, Liya Ma, Meng Wang, Hong Mei...
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
In today’s businesses we can see the trend that serviceoriented architectures (SOA) represent the main paradigm for IT infrastructures. In this setting, a software offers its fu...
We propose a software development method for enterprise applications that combines the use of the structural concepts provided by problem frames, and the use of the UML notation. ...
Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...