Sciweavers

8623 search results - page 1490 / 1725
» Software engineering for secure systems
Sort
View
172
Voted
MIDDLEWARE
2005
Springer
15 years 10 months ago
Middleware for protocol-based coordination in dynamic networks
Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
176
Voted
EUROMICRO
2003
IEEE
15 years 10 months ago
An Implementation of an Overlay Network Architecture Scheme for Streaming Media Distribution
In this paper we introduce the implementation of a streaming video distribution scheme based on client relay modules. The purpose is the formation and maintenance of an overlay ne...
Charalampos Z. Patrikakis, Y. Despotopoulos, Andre...
133
Voted
SEKE
2009
Springer
15 years 9 months ago
Improving Negotiations through Fuzzy Cognitive Maps
In a decision-making process, a systematic method to manage and measure negotiation aspects provides crucial information to negotiators and has emerged as a key factor to determin...
Sérgio Assis Rodrigues, Tiago Santos da Sil...
ESEC
1997
Springer
15 years 9 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...
CMG
2000
15 years 6 months ago
Building Responsive and Scalable Web Applications
Responsiveness and scalability are important quality-of-service attributes for Web applications. Web sites that are slow, either because of poor responsiveness or lack of scalabil...
Connie U. Smith, Lloyd G. Williams
« Prev « First page 1490 / 1725 Last » Next »