Sciweavers

1366 search results - page 217 / 274
» Modularizing Contexted Constraints
Sort
View
LCPC
2005
Springer
15 years 8 months ago
Software Thread Level Speculation for the Java Language and Virtual Machine Environment
Thread level speculation (TLS) has shown great promise as a strategy for fine to medium grain automatic parallelisation, and in a hardware context techniques to ensure correct TLS...
Christopher J. F. Pickett, Clark Verbrugge
OTM
2005
Springer
15 years 8 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...
SOCO
2005
Springer
15 years 8 months ago
Flexible Binding for Reusable Composition of Web Services
Abstract. In addition to publishing composite services as reusable services, compositions can also be reused by applying them to orchestrate different component services. To do so...
Cesare Pautasso, Gustavo Alonso
WCC
2005
Springer
130views Cryptology» more  WCC 2005»
15 years 8 months ago
On the Design of Codes for DNA Computing
In this paper, we describe a broad class of problems arising in the context of designing codes for DNA computing. We primarily focus on design considerations pertaining to the phen...
Olgica Milenkovic, Navin Kashyap
BPM
2004
Springer
119views Business» more  BPM 2004»
15 years 8 months ago
A Workflow-Oriented System Architecture for the Management of Container Transportation
In this paper, we introduce a workflow-oriented system architecture for the processing of client requests (CRs) for container transportation. In the context of multi-transfer conta...
Sarita Bassil, Rudolf K. Keller, Peter G. Kropf