Sciweavers

8503 search results - page 1413 / 1701
» Secure Software Architectures
Sort
View
ISPASS
2008
IEEE
15 years 10 months ago
Investigating the TLB Behavior of High-end Scientific Applications on Commodity Microprocessors
The floating point portion of the SPEC CPU suite and the HPC Challenge suite are widely recognized and utilized as benchmarks that represent scientific application behavior. In th...
Collin McCurdy, Alan L. Cox, Jeffrey S. Vetter
ISSRE
2008
IEEE
15 years 10 months ago
A QoS-Aware Middleware for Fault Tolerant Web Services
Reliability is a key issue of the Service-Oriented Architecture (SOA) which is widely employed in critical domains such as e-commerce and e-government. Redundancy-based fault tole...
Zibin Zheng, Michael R. Lyu
SEAA
2008
IEEE
15 years 10 months ago
GRAIL - A Tool for Accessing and Instrumenting WSRF - compliant Web Services
Grid access methods are still dominated by command line tools or manually developed, problem specific graphical user interfaces. This fact reduces the acceptance of the Grid for ...
Thomas Jejkal, Rainer Stotzka, Michael Sutter
155
Voted
TRIDENTCOM
2008
IEEE
15 years 10 months ago
A quantitative evaluation of the MeshTest wireless testbed
The MeshTest testbed is designed to subject wireless devices and protocols to realistic and repeatable mobile scenarios, including multi-hop and disconnected topologies. The testb...
Brenton Walker, Charles Clancy
146
Voted
WCRE
2008
IEEE
15 years 10 months ago
Discovering New Change Patterns in Object-Oriented Systems
Modern software has to evolve to meet the needs of stakeholders; but the nature and scope of this evolution is difficult to anticipate and manage. In this paper, we examine techn...
Stéphane Vaucher, Houari A. Sahraoui, Jean ...
« Prev « First page 1413 / 1701 Last » Next »