Sciweavers

1477 search results - page 59 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
IFIP
2007
Springer
15 years 6 months ago
Identity as a Service - Towards a Service-Oriented Identity Management Architecture
Service-oriented architecture (SOA) will form the basis of future information systems. Web services are a promising way to implement SOA enabling the loose coupling of functionalit...
Christian Emig, Frank Brandt, Sebastian Kreuzer, S...
KONVENS
1992
15 years 4 months ago
Flexible Semantics Communication in Integrated Speech / Language Architectures
: We consider communication between modules in an integrated architecture for Speech and Natural Language (NL), in particular the communication with the semantics module. In an int...
Abdel Kader Diagne, John Nerbonne
HPCC
2009
Springer
15 years 4 months ago
C2Cfs: A Collective Caching Architecture for Distributed File Access
—In this paper we present C2Cfs - a decentralized collective caching architecture for distributed filesystems. C2Cfs diverges from the traditional client-server model and advoca...
Andrey Ermolinskiy, Renu Tewari
IJAMC
2010
114views more  IJAMC 2010»
14 years 10 months ago
Design issues for Peer-to-Peer Massively Multiplayer Online Games
: Massively Multiplayer Online Games (MMOGs) are increasing in both popularity and scale, and while classical Client/Server architectures convey some benefits, they suffer from s...
Lu Fan, Philip W. Trinder, Hamish Taylor
ICSE
2007
IEEE-ACM
15 years 12 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin