Sciweavers

6574 search results - page 111 / 1315
» Current Signatures: Application
Sort
View
99
Voted
JDCTA
2010
148views more  JDCTA 2010»
14 years 7 months ago
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform
Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application developme...
Yao Rong, Jiandong Wang
88
Voted
WMCSA
2009
IEEE
15 years 7 months ago
Enabling new mobile applications with location proofs
Location is rapidly becoming the next “killer application” as location-enabled mobile handheld devices proliferate. One class of applications that has yet-to-emerge are those ...
Stefan Saroiu, Alec Wolman
97
Voted
IPPS
1998
IEEE
15 years 5 months ago
Migration and Rollback Transparency for Arbitrary Distributed Applications in Workstation Clusters
Programmers and users of compute intensive scientific applications often do not want to (or even cannot) code load balancing and fault tolerance into their programs. The PBEAM syst...
Stefan Petri, Matthias Bolz, Horst Langendörf...
106
Voted
IDEAS
2000
IEEE
90views Database» more  IDEAS 2000»
15 years 5 months ago
StreamJoin: A Generic Database Approach to Support the Class of Stream-Oriented Applications
Today many applications routinely generate large quantities of data. The data often takes the form of (time) series, or more generally streams, i.e. an ordered sequence of records...
Clara Nippl, Ralf Rantzau, Bernhard Mitschang
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
15 years 4 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...