Sciweavers

1656 search results - page 121 / 332
» Building Dependable Distributed Applications Using AQUA
Sort
View
156
Voted
CIKM
2007
Springer
15 years 9 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
EDOC
2008
IEEE
15 years 3 months ago
A Tactic-Based Approach to Embodying Non-functional Requirements into Software Architectures
This paper presents an approach for embodying nonfunctional requirements (NFRs) into software architecture using architectural tactics. Architectural tactics are reusable architec...
Suntae Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park
133
Voted
CCGRID
2007
IEEE
15 years 10 months ago
Build-and-Test Workloads for Grid Middleware: Problem, Analysis, and Applications
The Grid promise is starting to materialize today: largescale multi-site infrastructures have grown to assist the work of scientists from all around the world. This tremendous gro...
Alexandru Iosup, Dick H. J. Epema
144
Voted
FASE
2010
Springer
15 years 1 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
115
Voted
CAISE
1999
Springer
15 years 8 months ago
CPAM, A Protocol for Software Composition
Software composition is critical for building large-scale applications. In this paper, we consider the composition of components that are methods offered by heterogeneous, autonomo...
Laurence Melloul, Dorothea Beringer, Neal Sample, ...