Sciweavers

8503 search results - page 1326 / 1701
» Secure Software Architectures
Sort
View
137
Voted
DILS
2006
Springer
15 years 7 months ago
Data Access and Integration in the ISPIDER Proteomics Grid
Abstract. Grid computing has great potential for supporting the integration of complex, fast changing biological data repositories to enable distributed data analysis. One scenario...
Lucas Zamboulis, Hao Fan, Khalid Belhajjame, Jenni...
ESAW
2006
Springer
15 years 7 months ago
A Norm-Governed Systems Perspective of Ad Hoc Networks
Ad hoc networks are a type of computational system whose members may fail to, or choose not to, comply with the laws governing their behaviour. We are investigating to what extent ...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt
125
Voted
FPL
2006
Springer
161views Hardware» more  FPL 2006»
15 years 7 months ago
Predictive Load Balancing for Interconnected FPGAs
A Field Programmable Gate Array (FPGA), when used as a platform for implementing special-purpose computing architectures, offers the potential for increased functional parallelism...
Jason D. Bakos, Charles L. Cathey, Allen Michalski
130
Voted
APCSAC
2001
IEEE
15 years 7 months ago
Stacking them up: a Comparison of Virtual Machines
A popular trend in current software technology is to gain program portability by compiling programs to an inte form based on an abstract machine definition. Such approaches date b...
K. John Gough
137
Voted
ITS
2000
Springer
140views Multimedia» more  ITS 2000»
15 years 7 months ago
Multi-agent Negotiation to Support an Economy for Online Help and Tutoring
We are designing a computational architecture for a "learning economy" based on personal software agents who represent users in a virtual society and assist them in find...
Chhaya Mudgal, Julita Vassileva
« Prev « First page 1326 / 1701 Last » Next »