Sciweavers

14824 search results - page 2542 / 2965
» Security - Introduction
Sort
View
MDM
2007
Springer
148views Communications» more  MDM 2007»
15 years 10 months ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen
128
Voted
MIDDLEWARE
2007
Springer
15 years 10 months ago
XenSocket: A High-Throughput Interdomain Transport for Virtual Machines
This paper presents the design and implementation of XenSocket, a UNIX-domain-socket-like construct for high-throughput interdomain (VM-to-VM) communication on the same system. The...
Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, J...
141
Voted
MIDDLEWARE
2007
Springer
15 years 10 months ago
Promoting levels of openness on component-based adaptable middleware
It is widely accepted that middleware is an important architectural element which facilitates the development of software systems. In this paper we propose a novel approach for de...
Tarcisio da Rocha, Anna-Brith Arntsen, Arne Ketil ...
119
Voted
MODELS
2007
Springer
15 years 10 months ago
UML2Alloy: A Challenging Model Transformation
Abstract. Alloy is a formal language, which has been applied to modelling of systems in a wide range of application domains. It is supported by Alloy Analyzer, a tool, which allows...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
OOPSLA
2007
Springer
15 years 10 months ago
Microphase: an approach to proactively invoking garbage collection for improved performance
To date, the most commonly used criterion for invoking garbage collection (GC) is based on heap usage; that is garbage collection is invoked when the heap or an area inside the he...
Feng Xian, Witawas Srisa-an, Hong Jiang
« Prev « First page 2542 / 2965 Last » Next »