Sciweavers

14824 search results - page 2594 / 2965
» Security - Introduction
Sort
View
137
Voted
OOPSLA
2005
Springer
15 years 9 months ago
A delta-driven execution model for semantic computing
We describe (and demonstrate) the execution model of a computing platform where computation is both incremental and data-driven. We call such an approach delta-driven. The platfor...
Roly Perera, Jeff Foster, György Koch
109
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
127
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Fortune teller: improving garbage collection performance in server environment using live objects prediction
Currently, the most adopted criterion to invoke garbage collection is heap space exhaustion. In other words, garbage collection is invoked when the heap space (either the entire s...
Feng Xian, Witawas Srisa-an, Hong Jiang
142
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Modeling architectural patterns using architectural primitives
Architectural patterns are a key point in architectural documentation. Regrettably, there is poor support for modeling architectural patterns, because the pattern elements are not...
Uwe Zdun, Paris Avgeriou
125
Voted
OTM
2005
Springer
15 years 9 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
« Prev « First page 2594 / 2965 Last » Next »