Sciweavers

10625 search results - page 1930 / 2125
» Supporting delay-intolerant applications
Sort
View
NDSS
2003
IEEE
15 years 3 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
P2P
2003
IEEE
110views Communications» more  P2P 2003»
15 years 3 months ago
Range Addressable Network: A P2P Cache Architecture for Data Ranges
Peer-to-peer computing paradigm is emerging as a scalable and robust model for sharing media objects. In this paper, we propose an architecture and describe the associated algorit...
Anshul Kothari, Divyakant Agrawal, Abhishek Gupta,...
WCRE
2003
IEEE
15 years 3 months ago
Leveraging Visio for Adoption-Centric Reverse Engineering Tools
There are many reasons why reverse engineering research tools often fail to be evaluated or adopted in industry. Their rough user interfaces and poor interoperability are just two...
Qin Zhu, Yu Chen, Piotr Kaminski, Anke Weber, Holg...
WISE
2003
Springer
15 years 3 months ago
Flexible Interface Matching for Web-Service Discovery
The web-services stack of standards is designed to support the reuse and interoperation of software components on the web. A critical step, to that end, is service discovery, i.e....
Yiqiao Wang, Eleni Stroulia
WMCSA
2003
IEEE
15 years 3 months ago
Real-world Implementation of the Location Stack: The Universal Location Framework
Both the research community and developers in industry have identified the need for a clearly defined vocabulary and programming framework for location technologies. A layered Loc...
David Graumann, Jeffrey Hightower, Walter Lara, Ga...
« Prev « First page 1930 / 2125 Last » Next »