Sciweavers

8503 search results - page 1410 / 1701
» Secure Software Architectures
Sort
View
87
Voted
SAC
2010
ACM
15 years 7 months ago
Design pattern implementation in object teams
Implementing the 23 Gang-of-Four design patterns in the aspectoriented programming language Object Teams/Java (OT/J) yields modularity and reusability results roughly comparable t...
João L. Gomes, Miguel P. Monteiro
127
Voted
SAC
2009
ACM
15 years 7 months ago
A personalized framework for trust assessment
The number of computational trust models has been increasing rapidly in recent years, yet their applications for automating trust evaluation are still limited. The main obstacle i...
Trung Dong Huynh
HIPEAC
2009
Springer
15 years 7 months ago
Parallel H.264 Decoding on an Embedded Multicore Processor
In previous work the 3D-Wave parallelization strategy was proposed to increase the parallel scalability of H.264 video decoding. This strategy is based on the observation that inte...
Arnaldo Azevedo, Cor Meenderinck, Ben H. H. Juurli...
EDOC
2009
IEEE
15 years 7 months ago
An End-to-End Approach for QoS-Aware Service Composition
Abstract—A simple and effective composition of software services into higher-level composite services is still a very challenging task. Especially in enterprise environments, Qua...
Florian Rosenberg, Predrag Celikovic, Anton Michlm...
EUROMICRO
2009
IEEE
15 years 7 months ago
Foundations for a Model-Driven Integration of Business Services in a Safety-Critical Application Domain
—Current architectures for systems integration provide means for forming agile business processes by manually or dynamically configuring the components. However, a major challeng...
Richard Mordinyi, Thomas Moser, eva Kühn, Ste...
« Prev « First page 1410 / 1701 Last » Next »