Computing Trends and Converging Technological Factors With Device Metric Enhancement to Envelop Application Wide Middleware Infrastructure
نویسندگان
چکیده
منابع مشابه
Applying Model-Integrated Computing to Middleware and Application Components
Enterprise application is a term applied to a large class of applications that comprise enterprise resource planning (ERP), shop floor automation, supply chain management (SCM), ebusiness and customer relationship management (CRM) systems. Examples of enterprise applications include airline reservation systems, bank asset management systems, and businessto-business supply chain management syste...
متن کاملVulnerability Assessment Enhancement for Middleware for Computing and Informatics
Security on Grid computing is often an afterthought. However assessing security of middleware systems is of the utmost importance because they manage critical resources owned by different organizations. To fulfill this objective we use First Principles Vulnerability Assessment (FPVA), an innovative analystic-centric (manual) methodology that goes beyond current automated vulnerability tools. FP...
متن کاملHigh Performance Computing: Infrastructure, Application, and Operation
The last decades have witnessed an increasingly indispensible role of high performance computing (HPC) in science, business and financial sectors, as well as military and national security areas. To introduce key aspects of HPC to a broader community, an HPC session was organized for the first time ever for the United States and Korea Conference (UKC) during 2012. This paper summarizes four inv...
متن کاملApplication and Infrastructure Challenges in Pervasive Computing
The technological advances over the last few years has revolutionized the world of personal computing. Today, handheld devices exist that can function as a cellular phone, video camera and a PDA, all in one box. Also, wireless service providers have started offering numerous data services over their networks (e.g., NTT DoCoMo’s I-Mode). With all these diverse technologies coming together, the v...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Engineering and Applications Journal
سال: 2013
ISSN: 2252-5459,2252-4274
DOI: 10.18495/comengapp.v2i2.25