Sciweavers

3441 search results - page 635 / 689
» Provenance of Software Development Processes
Sort
View
101
Voted
WSC
1998
15 years 2 months ago
The DoD High Level Architecture: an update
The High Level Architecture (HLA) provides the specification of a common technical architecture for use across all classes of simulations in the US Department of Defense. It provi...
Judith S. Dahmann, Richard Fujimoto, Richard M. We...
143
Voted
CASCON
1996
160views Education» more  CASCON 1996»
15 years 2 months ago
Automatic generation of performance models for distributed application systems
Organizations have become increasingly dependent on computing systems to achieve their business goals. The performance of these systems in terms of response times and cost has a m...
M. Qin, R. Lee, Asham El Rayess, Vidar Vetland, Je...
119
Voted
DOCENG
2010
ACM
15 years 1 months ago
Using model driven engineering technologies for building authoring applications
Building authoring applications is a tedious and complex task that requires a high programming effort. Document technologies, especially XML based ones, can help in reducing such ...
Olivier Beaudoux, Arnaud Blouin, Jean-Marc J&eacut...
ERCIMDL
2010
Springer
168views Education» more  ERCIMDL 2010»
15 years 1 months ago
The Planets Testbed - A Collaborative Research Environment for Digital Preservation
The Planets Testbed is an open access web application for the digital preservation community, providing an experimental framework for evaluating preservation tools and approaches i...
Brian Aitken, Seamus Ross, Andrew Lindley, Edith M...
ESORICS
2010
Springer
15 years 1 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik