scispace - formally typeset
Search or ask a question
Topic

Application software

About: Application software is a research topic. Over the lifetime, 12185 publications have been published within this topic receiving 219822 citations. The topic is also known as: software application & application software.


Papers
More filters
Proceedings ArticleDOI
20 Sep 1994
TL;DR: This paper describes a formal approach to domain-oriented software design environments, based on declarative domain theories, formal specifications, and deductive program synthesis, which enables space scientists to develop, modify, and reuse specifications an order of magnitude more rapidly than manual program development.
Abstract: This paper describes a formal approach to domain-oriented software design environments, based on declarative domain theories, formal specifications, and deductive program synthesis. A declarative domain theory defines the semantics of a domain-oriented specification language and its relationship to implementation-level subroutines. Formal specification development and reuse is made accessible to users through an intuitive graphical interface that guides them in creating diagrams denoting formal specifications. Deductive program synthesis ensures that specifications are correctly implemented. This approach has been implemented in AMPHION, a generic KBSE system that targets scientific subroutine libraries. AMPHION has been applied to the domain of solar system kinematics. AMPHION enables space scientists to develop, modify, and reuse specifications an order of magnitude more rapidly than manual program development. Program synthesis is efficient and completely automatic. >

62 citations

Journal ArticleDOI
TL;DR: The authors use ThumbPod, a prototype embedded security application, for remote identification applications such as intelligent keys or electronic payments, which combines security, biometrics, and networking domains.
Abstract: Systems with multiple design domains require codesign of application domains. Dedicated hardware processors implement the application domains and software integrates them. The authors use ThumbPod, a prototype embedded security application, for remote identification applications such as intelligent keys or electronic payments. The device combines security, biometrics, and networking domains. Additional software support consists of a dynamic application download using the Java application manager. Sun's K virtual machine offers an infrastructure for secure code download and execution. The virtual machine also integrates the cryptoprocessor through a native interface.

62 citations

Proceedings ArticleDOI
09 Jul 2007
TL;DR: The problem of automatic service discovery and composition based on semantic description of Web services is formally defined and an approach for automatic serviceiscovery and compositionbased on semantic Description of Web Services is presented.
Abstract: Service-oriented computing is gaining wider acceptance. For Web services to become practical, an infrastructure needs to be supported that allows users and applications to discover, deploy, compose and synthesize services automatically. For this automation to be effective, formal semantic descriptions of Web services should be available. In this paper we formally define the Web service discovery and composition problem and present an approach for automatic service discovery and composition based on semantic description of Web services. We also report on an implementation of a semantics-based automated service discovery and composition engine that we have developed. This engine employs a multi-step narrowing algorithm and is efficiently implemented using the constraint logic programming technology. The salient features of our engine are its scalability, i.e., its ability to handle very large service repositories, and its extremely efficient processing times for discovery and composition queries. We evaluate our engine for automated discovery and composition on repositories of different sizes and present the results.

62 citations

Journal ArticleDOI
TL;DR: A taxonomy of fault tolerance in commercial computers is set forth, organized around three orthogonal axes: the sources of errors the computer tolerates, thecomputer's approach to tolerating errors, and the computer's structure.
Abstract: A taxonomy of fault tolerance in commercial computers is set forth. It is organized around three orthogonal axes: the sources of errors the computer tolerates, the computer's approach to tolerating errors, and the computer's structure. Each of these is briefly discussed. An example of each class in the taxonomy is presented, as well as its approach to answering the following questions: (1) Is the system to be highly reliable or highly available? (2) Do all outputs have to be correct, or only data committed to long-term storage? (3) How familiar must the user be with the architecture and software redundancy? (4) Is the system dedicated so that attributes of the application can be used to simplify fault tolerance techniques? (5) Is the system constrained to use existing components? (6) Even if the design is new, what cost and/or performance penalty does it impose on the user who does not require fault tolerance? (7) Is the system stand-alone, or can other processors be called upon to assist in times of failure? The computers covered are the VAX 8600 and IBM 3090 uniprocessors, the Tandem, Stratus, and VAXft 3000 multicomputers, and the Teradata and Sequoia multiprocessors. >

61 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
87% related
User interface
85.4K papers, 1.7M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
82% related
Wireless
133.4K papers, 1.9M citations
82% related
Node (networking)
158.3K papers, 1.7M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202191
2020151
2019237
2018321
2017359
2016364