Sciweavers

1315 search results - page 195 / 263
» Towards Requirements Engineering for Context Adaptive System...
Sort
View
121
Voted
EDBT
2008
ACM
130views Database» more  EDBT 2008»
16 years 1 months ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 7 months ago
Outlier Detection for Fine-grained Load Balancing in Database Clusters
Recent industry trends towards reducing the costs of ownership in large data centers emphasize the need for database system techniques for both automatic performance tuning and ef...
Jin Chen, Gokul Soundararajan, Madalin Mihailescu,...
AGTIVE
2003
Springer
15 years 6 months ago
Integrating Graph Rewriting and Standard Software Tools
OptimixJ is a graph rewrite tool that can be embedded easily into the standard software process. Applications and models can be developed in Java or UML and extended by graph rewri...
Uwe Aßmann, Johan Lövdahl
JUCS
2010
159views more  JUCS 2010»
14 years 8 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
128
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 6 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...