Incremental parallel computing for continuous queries in dynamic graphs using a transactional model. | 0 | 0.34 | 2018 |
A Transactional Model for Parallel Programming of Graph Applications on Computing Clusters | 1 | 0.35 | 2017 |
Design of a Location-Based Publish/Subscribe Service Using a Graph-Based Computing Model | 0 | 0.34 | 2017 |
A Transaction Model with Multilevel Consistency for Shared Data in Distributed Groupware Systems | 0 | 0.34 | 2016 |
Scalable Transaction Management for Partially Replicated Data in Cloud Computing Environments | 0 | 0.34 | 2016 |
Scalable Transaction Management with Snapshot Isolation for NoSQL Data Storage Systems | 6 | 0.43 | 2015 |
A transaction model for management of replicated data with multiple consistency levels | 5 | 0.42 | 2015 |
Beehive: A Framework for Graph Data Analytics on Cloud Computing Platforms | 1 | 0.36 | 2014 |
Resource Availability Characteristicsand Node Selection in CooperativelyShared Computing Platforms | 0 | 0.34 | 2014 |
Scalable Transaction Management with Snapshot Isolation on Cloud Data Management Systems | 5 | 0.51 | 2012 |
A Generative Programming Framework for Context-Aware CSCW Applications | 10 | 0.50 | 2012 |
Building Autonomically Scalable Services on Wide-Area Shared Computing Platforms | 2 | 0.37 | 2011 |
A Test Bed for Information Security Skill Development with Virtual Training Environment. | 0 | 0.34 | 2010 |
Resource-Aware Migratory Services in Wide-Area Shared Computing Environments | 3 | 0.40 | 2009 |
Application-Level Recovery Mechanisms for Context-Aware Pervasive Computing | 3 | 0.45 | 2008 |
Context-aware role-based access control in pervasive computing systems | 109 | 2.98 | 2008 |
Autonomic configuration and recovery in a mobile agent-based distributed event monitoring system | 1 | 0.35 | 2007 |
Specification and verification of security requirements in a programming model for decentralized CSCW systems | 9 | 0.56 | 2007 |
Workshop Summary--ICSE Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments (SEPCASE) | 0 | 0.34 | 2007 |
Mechanisms for object caching in distributed applications using Java RMI | 4 | 0.50 | 2007 |
Advanced Topics in Exception Handling Techniques (the book grow out of ECOOP workshops) | 14 | 0.95 | 2006 |
Exception handling in CSCW applications in pervasive computing environments | 3 | 0.46 | 2006 |
A specification model for context-based collaborative applications | 14 | 0.82 | 2005 |
Object-based commutativity analysis for real-time applications | 2 | 0.37 | 2005 |
Context-Based Secure Resource Access in Pervasive Computing Environments | 25 | 1.17 | 2004 |
Robustness and Security in a Mobile-Agent Based Network Monitoring System | 4 | 0.54 | 2004 |
The guardian model and primitives for exception handling in distributed systems | 17 | 0.82 | 2004 |
Guest editorial | 1 | 0.37 | 2004 |
Static verification of security requirements in role based CSCW systems | 39 | 2.50 | 2003 |
Specification of Secure Distributed Collaboration Systems | 13 | 1.16 | 2003 |
Paradigms for mobile agent based active monitoring of network systems | 10 | 0.98 | 2002 |
The Guardian Model for Exception Handling in Distributed Systems | 8 | 0.56 | 2002 |
Secure multi-agent coordination in a network monitoring system | 2 | 0.52 | 2002 |
Challenges designing next-generation middleware systems | 57 | 2.18 | 2002 |
Design of the Ajanta system for mobile agent programming | 27 | 1.27 | 2002 |
Design of a policy-driven middleware for secure distributed collaboration | 15 | 0.97 | 2002 |
Efficient Object Caching for Distributed Java RMI Applications | 13 | 0.86 | 2001 |
Experiences and future challenges in mobile agent programming | 15 | 0.95 | 2001 |
Advances in Exception Handling Techniques (the book grow out of a ECOOP 2000 workshop) | 17 | 2.39 | 2001 |
Security in the Ajanta mobile agent system | 63 | 3.85 | 2001 |
Distributed Collaborations Using Network Mobile Agents | 7 | 0.79 | 2000 |
Guest Editors' Introduction-Current Trends in Exception Handling. | 0 | 0.34 | 2000 |
A security architecture for mobile agents in Ajanta | 31 | 1.76 | 2000 |
Exception Handling in Object Oriented Systems | 4 | 0.54 | 2000 |
Exception handling in agent-oriented systems | 28 | 1.09 | 2000 |
Delegation of Privileges to Mobile Agents in Ajanta | 1 | 0.38 | 2000 |
Mobile Agent Programming in Ajanta | 34 | 2.56 | 1999 |
Computer Systems Research: The Pressure Is On | 6 | 0.79 | 1999 |
Education: Keeping up with the information technology revolution | 0 | 0.34 | 1999 |
Design Issues in Mobile-Agent Programming Systems | 113 | 8.13 | 1998 |