Sciweavers

4719 search results - page 609 / 944
» Applications = Components GLoo
Sort
View
SEC
2004
15 years 5 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
155
Voted
SERP
2004
15 years 5 months ago
Using ZOOM Approach to Support MDD
Model-Driven Development (MDD) represents a positive step toward a general model-based approach to software engineering. The Object Management Group (OMG) offers a conceptual fram...
Xiaoping Jia, Adam Steele, Hongming Liu, Lizhang Q...
VG
2001
15 years 5 months ago
Topology-Guided Downsampling
We present a new downsampling method for structured volume grids, which preserves much more of the topology of a scalar field than existing downsampling methods by preferably selec...
Martin Kraus, Thomas Ertl
WICSA
2001
15 years 5 months ago
MAP - Mining Architectures for Product Line Evaluations
Product lines evolve out of existing products. In order to evaluate the potential of creating a product line from existing products it is necessary to `mine' their architectu...
Christoph Stoermer, Liam O'Brien
WIS
2004
15 years 5 months ago
Ordering in Mobile Networks Using Integrated Sequencers
Distributed applications mostly interact by exchanging messages. For this purpose the messages often need to be ordered. Since today more and more mobile devices are used message o...
Sven Bittner