Computing Trends and Converging Technological Factors With Device Metric Enhancement to Envelop Application Wide Middleware Infrastructure

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying Model-Integrated Computing to Middleware and Application Components

Enterprise application is a term applied to a large class of applications that comprise enterprise resource planning (ERP), shop floor automation, supply chain management (SCM), ebusiness and customer relationship management (CRM) systems. Examples of enterprise applications include airline reservation systems, bank asset management systems, and businessto-business supply chain management syste...

متن کامل

Vulnerability Assessment Enhancement for Middleware for Computing and Informatics

Security on Grid computing is often an afterthought. However assessing security of middleware systems is of the utmost importance because they manage critical resources owned by different organizations. To fulfill this objective we use First Principles Vulnerability Assessment (FPVA), an innovative analystic-centric (manual) methodology that goes beyond current automated vulnerability tools. FP...

متن کامل

High Performance Computing: Infrastructure, Application, and Operation

The last decades have witnessed an increasingly indispensible role of high performance computing (HPC) in science, business and financial sectors, as well as military and national security areas. To introduce key aspects of HPC to a broader community, an HPC session was organized for the first time ever for the United States and Korea Conference (UKC) during 2012. This paper summarizes four inv...

متن کامل

Application and Infrastructure Challenges in Pervasive Computing

The technological advances over the last few years has revolutionized the world of personal computing. Today, handheld devices exist that can function as a cellular phone, video camera and a PDA, all in one box. Also, wireless service providers have started offering numerous data services over their networks (e.g., NTT DoCoMo’s I-Mode). With all these diverse technologies coming together, the v...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Engineering and Applications Journal

سال: 2013

ISSN: 2252-5459,2252-4274

DOI: 10.18495/comengapp.v2i2.25