scispace - formally typeset
Search or ask a question
Topic

Application software

About: Application software is a research topic. Over the lifetime, 12185 publications have been published within this topic receiving 219822 citations. The topic is also known as: software application & application software.


Papers
More filters
Patent
10 Dec 2008
TL;DR: In this paper, a method of and system for managing a one-time password security software application employed on a mobile computing device (12) is presented, which comprises generating a command message comprising command data specifying a type of command to be performed on the one time password security application, and a unique identification code to identify a data record on which the command is to be executed.
Abstract: A method of and system for managing a one time password security software application employed on a mobile computing device (12) are provided. The method comprises generating a command message comprising command data specifying a type of command to be performed on the one time password security application employed on the mobile computing device, and a unique identification code to identify a data record on which the command is to be performed or to identify a one time password algorithm and its associated authentication entity on which the command is to be performed. This message is transmitted by a turn key server (18) to the mobile computing device (12) for execution on the mobile computing device thereby to manage the one time password security software application.

50 citations

Patent
29 Jun 2011
TL;DR: In this article, a method for deploying an application in a virtual platform and a VMs manager is presented, which comprises the following steps of: pre-making an operating system mirror image of a virtual machine and installation scripts of an application software packet, wherein an automatically executed application deployment program is installed in the operating system mirrors image; generating an application request number and a virtual machines number according to a deployment request of application, and storing the application software packets and the installation scripts corresponding to the deployment request to a storage position corresponding to application request numbers after a physical machine is distributed to
Abstract: The invention provides a method for deploying application in a virtual platform and a virtual platform manager. The method comprises the following steps of: pre-making an operating system mirror image of a virtual machine and installation scripts of an application software packet, wherein an automatically executed application deployment program is installed in the operating system mirror image; generating an application request number and a virtual machine number according to a deployment request of application, and storing the application software packet and the installation scripts corresponding to the deployment request to a storage position corresponding to the application request number after a physical machine is distributed to the application; copying the operating system mirror image on the physical machine, wherein the operating system mirror image is used as virtual disk start of the virtual machine on the physical machine; and after the virtual machine is started, acquiring the application request number and the virtual machine number corresponding to the virtual machine by the application deployment program in the operating system mirror image, and then automatically executing the application. According to the method and the virtual platform manager, automatic dynamic configuration and deployment can be performed on the application, and difficulty and workload of application deployment are reduced.

50 citations

Journal ArticleDOI
TL;DR: This article describes work undertaken to automate storage and retrieval of complex data objects that contain text, images, voice, and programs, which pose a major problem in developing commercially viable database management systems capable of handling them.
Abstract: of attributes, text, images, and voice. T his article describes work undertaken to automate storage and T retrieval of complex data objects that contain text, images, voice, and programs. Until recently, the extremely large storage requirements of these objects posed a major problem in developing commercially viable database management systems capable of handling them. Database management systems that will manage multimedia information also have different functionality, interface, and performance requirements from traditional database management systems. Recent developments in hardware are now making automatic storage, retrieval, and manipulation of complex data objects both possible and economically feasible.

50 citations

Proceedings ArticleDOI
21 Apr 1999
TL;DR: The design of PCI-PipeRench and the SWORDAPI is discussed, a coprocessor utilizing the PipeRench architecture which includes on-chip control and data buffering to interface with a host processor over a PCI bus.
Abstract: Reconfigurable hardware accelerators have been shown to be flexible and efficient in stream-based applications. In this paper, we discuss the design of PCI-PipeRench and the SWORDAPI. PCI-PipeRench is a coprocessor utilizing the PipeRench architecture which includes on-chip control and data buffering to interface with a host processor over a PCI bus. SWORDAPI calls resemble standard C file control functions, and allow developers to create applications Independent of underlying reconfigurable hardware details. In addition, the SWORDAPI provides a cosimulation environment so that verification can be performed using unmodified application source with a hardware simulator. Efficient utilization of the bus is of critical importance in the design of such a system; various methods used to address this issue are presented.

50 citations

Patent
31 Oct 2003
TL;DR: In this article, the authors propose a method for limiting access to resources of a personal computer with an operating system while allowing access to information via a web browser program, by running on the personal computer a locking program that modifies functions of web browsers and functions of the operating system.
Abstract: A method for limiting access to resources of a personal computer with an operating system while allowing access to information via a web browser program. The method includes running on the personal computer a locking program that modifies functions of the web browser program and functions of the operating system to disable functions that allow access to any data file in a memory of the computer other than web browser access to a specified list of URL's until an authenticating input is received by the computer. The method may further include launching the web browser program if it is not already launched. The method may further include a delay from the running of the locking program until it disables functions of the operating system and the web browser program such that disabling is commenced upon expiration of a set amount of time without keyboard or mouse input activity.

50 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
87% related
User interface
85.4K papers, 1.7M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
82% related
Wireless
133.4K papers, 1.9M citations
82% related
Node (networking)
158.3K papers, 1.7M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202191
2020151
2019237
2018321
2017359
2016364