The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Developing scalable software architectures to suit virtual environment applications has been a challenge even in face of extraordinary advancements in computing and bandwidth power. In virtual environments, modifications to the world must be broadcasted across all clients, creating a network and processing complexity on the server-side that grows at an O(N2) rate. Therefore, scalability will always...
In interactive multi-user virtual environments, the computation and bandwidth required to perform real-time simulation increases quadratically with the number of users. Handling communication, storage and computation resources on the same machine hinders scalability. This paper presents a system architecture abiding to the constraints of the REpresentational State Transfer (REST) architectural style...
HPE is a platform of parallel components that complies to the # component model, whose components are intrinsically parallel. This paper describes the design of a new CCA framework based on HPE, aimed to reconcile distribution and parallelism of components. Besides exposing the essential differences between the two platforms, the new framework has a set of features that distinguishes it from other...
In service-oriented systems, composition of services is required to build new, distributed and more complex services, based on the logic behavior of individual ones. This paper discusses the formal composition of Petri nets models used for the process description and control in service-oriented automation systems. The proposed approach considers two forms for the composition of services, notably the...
In this paper we describe a novel Model-View-Controller based architecture, Centralized Control, that introduces collaboration in single-users applications. The architecture is able to add collaboration with no need to modify the source code of the original single-user application, and providing also the capability to introduce group semantics into the new, collaborative application that is obtained...
E-business systems, like Web based systems, usually use application server (AS) to support remote communication between heterogeneous systems. AS will certainly introduce great performance impacts to them transparently. This paper provides an impacts separation framework to automatically include these impacts into the application architecture. AS impacts are separated into isolated aspects and stored...
This paper introduces a new domain-oriented distributed vulnerability scanning mechanism based on the studies of other vulnerability scanning systems, which have difficulties on dealing with network crossing, interceptor crossing and bottleneck effect, etc. After giving some description about domain-oriented distributed architecture, this paper introduces a SOA-like service providing mode. Following...
The article discusses the characteristics of mobile and embedded database as well as its synchronization realization on mobile terminal along with practical application. The article further provides several methods to improve the data accessing rate, efficiency, stability, maintainability and uniformity of the database, including multithread technology, three-layer duplication/buffer architecture,...
Remote method invocation is a distributed object model for the Java programming language that making distributed objects easy to implement and tousle. Remote method invocation applications are often comprised of two separate programs: a Server and a Client. A typical server application creates a number of remote objects, makes references to those remote objects accessible, and waits for clients to...
NTSC and Uni-trust are constructing the public time-stamping service platform of China. In this paper, we present the architecture of Time-Stamping service and analyze the threats are encountered in each time-stamping system. Then we propose a modified architecture for overcoming these threats. This architecture is relies on a secure time service to obtain a authentic time stamp from the Time Authority,...
This paper presents a method for a lean platform modeling technology for sales activities collaborative management according to the requirement of small-to-medium size (STMS) companies in China on distributed sales activities collaborative management and sales data consolidated management. In the application, STMS companies normally sell their products via some direct sales channels built by them,...
Service-oriented architecture (SOA) is the architecture of software or information system, as well as a concept of coarse-grained components and loosely coupled framework. But SOA is generally believed as a simple Web service integration. This paper deeply discusses some concepts on SOA, insists that SOA is a developing methodology rather than a specific technology. Moreover, the paper expatiates...
This paper presents a new approach to designing business process management solutions leveraging the principles of service-oriented computing and representational state transfer. We discuss the IT artifacts that underpin this new design, illustrate the design using a real world example, and present an evaluation highlighting several desirable features of our approach.
In this paper we present new techniques for simulating high performance MPI applications on large storage networks. Performance analysis of high performance application on large storage networks is a very complex and time-consuming task. However, modelling and studying the behaviour of any application on complex network architectures is crucial to obtain good performance. The goal of this work is...
This paper mainly discusses about the architecture of CSCW. Three mainstream architectures have been proposed. A CSCW application that built upon the hybrid architecture will be more flexible than others since two other architectures can be seen as the special cases of the hybrid architecture. However, how to select the servers among the workstations remains an open discussion. Most of the selection...
In early 2007, ChannelAdvisor undertook an ambitious project to rearchitect one of its core product offerings. Flush with early success from rapid customer adoption, the foundation for this product had grown well beyond its initial design. As defects grew in frequency and severity, pressure mounted to "fix it yesterday", but consensus on exactly how proved elusive. "Fix it right"...
Team automata, as an extended automata-based model, possesses distinguishable characteristics which make it suitable to formally specify and evaluate software architectural design. In this paper, we describe the benefits of TA over similar automata models and show how can extend it to specify and evaluate performance of components interaction in software architectures. An application system example...
In a business environment, effective communication is crucial for the employeepsilas productivity and creativity. In this paper, we propose a SOA-based Collaboration Framework for mobile collaboration applications. This framework aims at promoting the business communication to a new level by means of architectural flexibility, lightweight design approach and a substantially increased availability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.