Sciweavers

794 search results - page 147 / 159
» Adopting a Software Component Model in Real-Time Systems Dev...
Sort
View
85
Voted
LISA
2007
15 years 2 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
CGO
2011
IEEE
14 years 3 months ago
Dynamically accelerating client-side web applications through decoupled execution
— The emergence and wide adoption of web applications have moved the client-side component, often written in JavaScript, to the forefront of computing on the web. Web application...
Mojtaba Mehrara, Scott A. Mahlke
COSIT
1997
Springer
115views GIS» more  COSIT 1997»
15 years 3 months ago
Qualitative Representation of Change
Current geographic information systems (GISs) have been designed for querying and maintaining static databases representing static phenomena and give little support to those users ...
Kathleen Hornsby, Max J. Egenhofer
89
Voted
JTAER
2010
100views more  JTAER 2010»
14 years 10 months ago
Determinants of Consumers' Perceived Trust in IT-Ecosystems
Digital ecosystems, or IT-ecosystems (ITEs), are composed of multiple and independent entities such as individuals, organizations, services, software, and applications. Together, ...
Klaus-Peter Wiedmann, Nadine Hennigs, Dieter Varel...
CONCUR
2006
Springer
15 years 3 months ago
Sanity Checks in Formal Verification
One of the advantages of temporal-logic model-checking tools is their ability to accompany a negative answer to the correctness query by a counterexample to the satisfaction of the...
Orna Kupferman