Sciweavers

1989 search results - page 111 / 398
» Integrity Management in Component Based Systems
Sort
View
144
Voted
GPC
2008
Springer
15 years 5 months ago
Middleware Integration and Deployment Strategies for Cyberinfrastructures
Virtual Organizations require infrastructure that meets their scientific needs. Traditionally, a VO can require access to computational backends that are suited for interactive app...
Sebastien Goasguen, Krishna Madhavan, David Wolins...
DATE
2007
IEEE
126views Hardware» more  DATE 2007»
15 years 11 months ago
The ARTEMIS cross-domain architecture for embedded systems
platform and a suite of abstract components with which new developments in different application domains can be engineered with minimal effort [1]p.16. Generic platforms, or refere...
Hermann Kopetz
135
Voted
RAID
2010
Springer
15 years 3 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
JDS
2007
104views more  JDS 2007»
15 years 4 months ago
Operational Risk Management How an I-DSS May Help
Operational Risk management, the least covered component of Enterprise Wide Risk Management, needs intelligent tools to implement Comprehensive Emergency Management Programs. In t...
Pedro A. C. Sousa, João Paulo Pimentã...
ECIS
2003
15 years 6 months ago
An architecture model for supporting application integration decisions
For a successful information systems architecture management, reference models and decision rules must be provided. In this paper, an architecture model and design rules are propo...
Robert Winter