Sciweavers

3971 search results - page 147 / 795
» On the Use of Properties in Java Applications
Sort
View
139
Voted
AGTIVE
2007
Springer
15 years 11 months ago
The EMF Model Transformation Framework
We present the EMF Model Transformation framework (EMT), which supports the rule-based modification of EMF models. Model transformation rules are defined graphically and compiled...
Enrico Biermann, Karsten Ehrig, Claudia Ermel, Chr...
JSS
2006
169views more  JSS 2006»
15 years 5 months ago
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL
This article analyses two most commonly used distributed models in Java: Web services and RMI (Remote Method Invocation). The paper focuses on regular (unsecured) as well as on se...
Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matj...
TEC
2002
166views more  TEC 2002»
15 years 4 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
PPDP
2004
Springer
15 years 10 months ago
JIAD: a tool to infer design patterns in refactoring
Refactoring in object-orientation has gained increased attention due to its ability to improve design quality. Refactoring using design patterns (DPs) leads to production of high ...
J. Rajesh, D. Janakiram
HICSS
2000
IEEE
124views Biometrics» more  HICSS 2000»
15 years 8 months ago
An Empirical Study of Distribution based on Voyager: A Performance Analysis
The paper describes the model, implementation and experimental evaluation of a distributed Kohonen Neural Network application (Kohonen Application). The aim of this research is to...
Sérgio Viademonte, Frada Burstein, Fá...