Topic
Application software
About: Application software is a research topic. Over the lifetime, 12185 publications have been published within this topic receiving 219822 citations. The topic is also known as: software application & application software.
Papers published on a yearly basis
Papers
More filters
••
01 Nov 2008TL;DR: A novel software platform that integrates the mainstream algorithms for medical image processing and analyzing within a consistent framework, including reconstruction, segmentation, registration, visualization, etc., and provides a powerful tool for both scientists and engineers.
Abstract: The design of software platform for medical imaging application has been increasingly prioritized as the sophisticated application of medical imaging. With this demand, we have designed and implemented a novel software platform in traditional object-oriented fashion with some common design patterns. This platform integrates the mainstream algorithms for medical image processing and analyzing within a consistent framework, including reconstruction, segmentation, registration, visualization, etc., and provides a powerful tool for both scientists and engineers. The overall framework and certain key technologies are introduced in detail. Presented experiment examples, numerous downloads, extensive uses, and practical applications commendably demonstrate the validity and flexibility of the platform.
73 citations
•
21 Jun 2016TL;DR: In this paper, a web-based application development server in a cloud system that provides an application development framework (ADF) is used to create an application through the application development UI and configure it to be downloaded from a download location in the cloud system.
Abstract: A system creates an application. The system accesses an application development user interface (“UI”) through a browser. The application development UI is hosted by a web-based application development server in a cloud system that provides an application development framework (“ADF”). The system develops the application through the application development UI. The application is developed with the ADF and is configured to be downloaded from a download location in the cloud system. The application is configured to be downloaded on a device as a native application.
73 citations
••
TL;DR: GEM is being used on a multiprocessor with robotics application software of substantial size and complexity and is closely coupled to prototype real-time programming environments that provide programming support for the models of computation offered by the operating system.
Abstract: To increase speed and reliability of operation, multiple computers are replacing uniprocessors and wired-logic controllers in modern robots and industrial control systems. However, performance increases are not attained by such hardware alone. The operating software controlling the robots or control systems must exploit the possible parallelism of various control tasks in order to perform the necessary computations within given real-time and reliability constraints. Such software consists of both control programs written by application programmers and operating system software offering means of task scheduling, intertask communication, and device control.The Generalized Executive for real-time Multiprocessor applications (GEM) is an operating system that addresses several requirements of operating software. First, when using GEM, programmers can select one of two different types of tasks differing in size, called processes and microprocesses. Second, the scheduling calls offered by GEM permit the implementation of several models of task interaction. Third, GEM supports multiple models of communication with a parameterized communication mechanism. Fourth, GEM is closely coupled to prototype real-time programming environments that provide programming support for the models of computation offered by the operating system. GEM is being used on a multiprocessor with robotics application software of substantial size and complexity.
73 citations
••
18 Oct 2004TL;DR: A model-based validation effort was undertaken as part of a unified approach to validating a networked intrusion-tolerant information system to determine whether a given survivability requirement was satisfied.
Abstract: An increasing number of computer systems are designed to be distributed across both local and wide-area networks, performing a multitude of critical information-sharing and computational tasks. Malicious attacks on such systems are a growing concern, where attackers typically seek to degrade quality of service by intrusions that exploit vulnerabilities in networks, operating systems, and application software. Accordingly, designers are seeking improved techniques for validating such systems with respect to specified survivability requirements. In this regard, we describe a model-based validation effort that was undertaken as part of a unified approach to validating a networked intrusion-tolerant information system. Model-based results were used to guide the system's design as well as to determine whether a given survivability requirement was satisfied.
73 citations
••
07 Jul 2008TL;DR: This paper uses the concepts of service version graphs and selection strategies to provide transparent end-to-end versioning support, and shows how this approach is implemented in the authors' service-oriented computing runtime VRESCo.
Abstract: Software services are, just like any other software system, subject to permanent change. We argue that these changes should generally be transparent to service consumers. However, currently consumers are often tied to a given version of a service and have no means of easily upgrading to a newer version. In this paper we propose a WSDL-driven classification of Web service change types and discuss a versioning mechanism for service-oriented systems that considers revision management on registry- and client-side. We use the concepts of service version graphs and selection strategies to provide transparent end-to-end versioning support, and show how this approach is implemented in our service-oriented computing runtime VRESCo. Furthermore, we illustrate the advantages of our approach in comparison to the current state of the art using a realistic case study.
73 citations