Sciweavers

8503 search results - page 1386 / 1701
» Secure Software Architectures
Sort
View
WMCSA
1999
IEEE
15 years 5 months ago
DataX: an Approach to Ubiquitous Database Access
This paper describes an approach for enabling remote database access from heterogeneous thin clients. DataX is a proxy-based architecture that supports disconnected operation by r...
Hui Lei, Marion Blount, Carl D. Tait
99
Voted
HICSS
1998
IEEE
94views Biometrics» more  HICSS 1998»
15 years 5 months ago
An Internet-Based Platform for Testing Generation Scheduling Auctions
This paper describes the uses and architecture of a network-centered computing-rich software platform called PowerWeb. PowerWeb was designed and built as a simulation environment ...
Ray Zimmerman, Robert J. Thomas, Deqiang Gan, Carl...
106
Voted
ICCL
1998
IEEE
15 years 5 months ago
Design and Implementation of Triveni: A Process-Algebraic API for Threads + Events
We describe Triveni, a framework and API for integrating threads and events. The design of Triveni is based on an algebra, including preemption combinators, of processes. Triveni ...
Christopher Colby, Lalita Jategaonkar Jagadeesan, ...
82
Voted
ISCA
1998
IEEE
122views Hardware» more  ISCA 1998»
15 years 5 months ago
Design Choices in the SHRIMP System: An Empirical Study
The SHRIMP cluster-computing system has progressed to a point of relative maturity; a variety of applications are running on a 16-node system. We have enough experience to underst...
Matthias A. Blumrich, Richard Alpert, Yuqun Chen, ...
103
Voted
COBUILD
1998
Springer
15 years 5 months ago
Multiple-Computer User Interfaces: A Cooperative Environment Consisting of Multiple Digital Devices
Traditional graphical user interfaces (GUIs) are mainly designed for an environment consisting of a single display and a set of single input devices. However, in the near future we...
Jun Rekimoto
« Prev « First page 1386 / 1701 Last » Next »