Sciweavers

1719 search results - page 264 / 344
» A Software Architecture for Structuring Complex Web Applicat...
Sort
View
ICSE
2007
IEEE-ACM
15 years 11 months ago
The Role of Experience and Ability in Comprehension Tasks Supported by UML Stereotypes
Proponents of design notations tailored for specific application domains or reference architectures, often available in the form of UML stereotypes, motivate them by improved unde...
Filippo Ricca, Massimiliano Di Penta, Marco Torchi...
DRM
2007
Springer
15 years 5 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
EDBTW
2010
Springer
15 years 4 months ago
Declarative scheduling in highly scalable systems
In modern architectures based on Web Services or Cloud Computing, a very large number of user requests arrive concurrently and has to be scheduled for execution constrained by cor...
Christian Tilgner
137
Voted
JIPS
2010
195views more  JIPS 2010»
14 years 5 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
15 years 4 months ago
Strategic Versus Tactical Design
Abstract. We seek to distinguish Strategic design decisions (e.g., to adopt a programming paradigm, architectural style, CBSE standard or application framework) from tactical desig...
Amnon H. Eden