Sciweavers

8623 search results - page 1560 / 1725
» Software engineering for secure systems
Sort
View
WAN
1998
Springer
15 years 8 months ago
The NRW Metacomputing Initiative
In this paper the Northrhine-Westphalian metacomputing initiative is described. We start by discussing various general aspects of metacomputing and explain the reasons for founding...
Uwe Schwiegelshohn, Ramin Yahyapour
WWW
2008
ACM
16 years 5 months ago
Investigating web services on the world wide web
Searching for Web service access points is no longer attached to service registries as Web search engines have become a new major source for discovering Web services. In this work...
Eyhab Al-Masri, Qusay H. Mahmoud
ICSE
2007
IEEE-ACM
15 years 10 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...
JUCS
2008
161views more  JUCS 2008»
15 years 4 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...
OOPSLA
2004
Springer
15 years 10 months ago
AJEER: an aspectJ-enabled eclipse runtime
There are a number of technologies designed to improve modularity in software systems. The technique presented here combines two of them seamlessly to exploit their respective ben...
Martin Lippert
« Prev « First page 1560 / 1725 Last » Next »