Middleware

Results: 2859



#Item
31Remoting Patterns A Systematic Approach for Design Reuse of Distributed Object Middleware Solutions Markus Völter Michael Kircher

Remoting Patterns A Systematic Approach for Design Reuse of Distributed Object Middleware Solutions Markus Völter Michael Kircher

Add to Reading List

Source URL: www.kircher-schwanninger.de

- Date: 2004-08-07 10:32:27
    32smart security interface  smart security interface© The charismathics smart security interface is a hardware independent PKI middleware which integrates directly with PKI applications. With CSSI© it is possible to use

    smart security interface smart security interface© The charismathics smart security interface is a hardware independent PKI middleware which integrates directly with PKI applications. With CSSI© it is possible to use

    Add to Reading List

    Source URL: planc.biz

    - Date: 2011-01-27 05:17:29
      33Non-functional properties in Operating Systems and Middleware Seminar Frank Feinbube, Christian Neuhaus, Lena Feinbube Prof. Dr. Andreas Polze

      Non-functional properties in Operating Systems and Middleware Seminar Frank Feinbube, Christian Neuhaus, Lena Feinbube Prof. Dr. Andreas Polze

      Add to Reading List

      Source URL: www.dcl.hpi.uni-potsdam.de

      - Date: 2016-04-14 10:01:50
        34Test-Framework for MOA-ID What is it about? MOA-ID acts as middleware enabling online applications the use of identification and authentication capabilities of

        Test-Framework for MOA-ID What is it about? MOA-ID acts as middleware enabling online applications the use of identification and authentication capabilities of

        Add to Reading List

        Source URL: www.iaik.tugraz.at

        - Date: 2015-09-08 06:00:07
          35Middleware: The Heart of GRID Computing FZ Karlsruhe, October 30th 2002 Michael M. Resch, Höchstleistungsrechenzentrum Stuttgart (HLRS),  Lots of information from William E. Johnston, Lawrence Berkeley

          Middleware: The Heart of GRID Computing FZ Karlsruhe, October 30th 2002 Michael M. Resch, Höchstleistungsrechenzentrum Stuttgart (HLRS), Lots of information from William E. Johnston, Lawrence Berkeley

          Add to Reading List

          Source URL: www.gridka.de

          - Date: 2013-04-22 09:20:36
            36Introduktion till SWAMID §  Kort historia:! §  Start ca 2003 med Codex och CWAA, WLAN inloggning och NyA! §  2005 startas Swami (SWedish Academic Middleware Initiative)! §  2006/7 ”SWAMID” inklusive edur

            Introduktion till SWAMID §  Kort historia:! §  Start ca 2003 med Codex och CWAA, WLAN inloggning och NyA! §  2005 startas Swami (SWedish Academic Middleware Initiative)! §  2006/7 ”SWAMID” inklusive edur

            Add to Reading List

            Source URL: www.se.ampr.org

            - Date: 2016-04-25 08:16:34
              37Another look at the middleware for dependable distributed computing Professor Mark Little, Red Hat Professor Santosh Shrivastava, Newcastle University Dr Stuart Wheater, Arjuna Technologies

              Another look at the middleware for dependable distributed computing Professor Mark Little, Red Hat Professor Santosh Shrivastava, Newcastle University Dr Stuart Wheater, Arjuna Technologies

              Add to Reading List

              Source URL: www.connect-forever.eu

              - Date: 2012-01-31 02:57:05
                38Server-side Architecture Middleware Middleware Gateway Gateway Gateway to remote server;

                Server-side Architecture Middleware Middleware Gateway Gateway Gateway to remote server;

                Add to Reading List

                Source URL: legacy.alexandria.ucsb.edu

                - Date: 2004-01-06 16:16:44
                  39Memory Hierarchy Design for Caching Middleware in the Age of NVM ∗ Shahram Ghandeharizadeh, Sandy Irani, Jenny Lam Database Laboratory Technical ReportComputer Science Department, USC Los Angeles, California 9

                  Memory Hierarchy Design for Caching Middleware in the Age of NVM ∗ Shahram Ghandeharizadeh, Sandy Irani, Jenny Lam Database Laboratory Technical ReportComputer Science Department, USC Los Angeles, California 9

                  Add to Reading List

                  Source URL: dblab.usc.edu

                  - Date: 2015-08-24 17:30:00
                    40SafeSign Identity Client  Token middleware with broadest platform support This competent all-rounder in terms  SafeSign IC offers the most

                    SafeSign Identity Client Token middleware with broadest platform support This competent all-rounder in terms SafeSign IC offers the most

                    Add to Reading List

                    Source URL: www.aeteurope.com

                    - Date: 2016-03-09 10:48:24