Sciweavers

2875 search results - page 331 / 575
» Using separation of concerns for embedded systems design
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 2 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
AOSD
2009
ACM
15 years 11 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
JCDL
2005
ACM
98views Education» more  JCDL 2005»
15 years 10 months ago
Using collection descriptions to enhance an aggregation of harvested item-level metadata
As an increasing number of digital library projects embrace the harvesting of item-level descriptive metadata, issues of description granularity and concerns about potential loss ...
Muriel Foulonneau, Timothy W. Cole, Thomas G. Habi...
164
Voted
ERLANG
2003
ACM
15 years 10 months ago
ARMISTICE: an experience developing management software with Erlang
In this paper, some experiences of using the concurrent functional language Erlang to implement a classical vertical application, a risk management information system, are present...
David Cabrero, Carlos Abalde, Carlos Varela, Laura...
139
Voted
PDPTA
2004
15 years 6 months ago
On-demand Grid Storage Using Scavenging
Increasingly scientific discoveries are driven by analyses of massively distributed bulk data. This has led to the proliferation of high-end mass storage systems, storage area clu...
Sudharshan Vazhkudai