Sciweavers

354 search results - page 49 / 71
» A Technique and Markup Language for Business Process Automat...
Sort
View
89
Voted
DSN
2006
IEEE
15 years 3 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
NLDB
2000
Springer
15 years 1 months ago
Conceptual Patterns - A Consolidation of Coad's and Wohed's Approaches
: The information system analysis process is considered as a difficult phase during the information systems development. The difficulty lies in gathering relevant information from ...
Petia Wohed
80
Voted
LOPSTR
2007
Springer
15 years 3 months ago
Preserving Sharing in the Partial Evaluation of Lazy Functional Programs
Abstract. The goal of partial evaluation is the specialization of programs w.r.t. part of their input data. Although this technique is already well-known in the context of function...
Sebastian Fischer, Josep Silva, Salvador Tamarit, ...
DOCENG
2008
ACM
14 years 11 months ago
An exploratory mapping strategy for web-driven magazines
"There will always (I hope) be print books, but just as the advent of photography changed the role of painting or film changed the role of theater in our culture, electronic ...
Fabio Giannetti
88
Voted
ECOWS
2009
Springer
15 years 4 months ago
A Model-Based Approach to Fault Diagnosis in Service Oriented Architectures
—This paper aims to present a method of creating architectures which allow monitoring occurrence of failure in Service oriented Architectures (SoA). The presented approach extend...
Mohammed Alodib, Behzad Bordbar