Sciweavers

690 search results - page 85 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
CSCW
2002
ACM
15 years 3 months ago
Collaboration as an Activity Coordinating with Pseudo-Collective Objects
A coalition is a collaborative pattern in which people must work together to accomplish a task, but where organizational constraints stand in the way of their making use of the co...
David Zager
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
LCTRTS
2009
Springer
15 years 10 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
SAC
2003
ACM
15 years 9 months ago
Systems Architecture for Pervasive Retail
Recent developments in mobile technologies and associated economies of scale via mature manufacturing processes have made possible the construction of pervasive systems in specifi...
George Roussos, Panos Kourouthanasis, Eugene A. Gr...
132
Voted
COMSWARE
2007
IEEE
15 years 10 months ago
A Peer-to-Peer Scheme to Discover and Select QoS Enhanced Alternate Paths
— Increasing number of communication softwares are built on distributed architectures based on the Peer-toPeer (P2P) model, such as Skype [1], and PeerCast [2]. This model provid...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...