scispace - formally typeset
Search or ask a question
Topic

Application software

About: Application software is a research topic. Over the lifetime, 12185 publications have been published within this topic receiving 219822 citations. The topic is also known as: software application & application software.


Papers
More filters
Patent
02 Jul 2002
TL;DR: In this paper, a system for developing and deploying a voice application using Web-based data as source data over a communications network to one or more recipients is described, which is based on the idea of using templates for the voice application server to use in data-to-voice rendering.
Abstract: A system is provided for developing and deploying a voice application using Web-based data as source data over a communications network to one or more recipients. The system has a voice application server capable of accessing a network server and Website hosted therein, a network communications server for routing the voice applications to their intended recipients, and a computer station running voice application software having control access to at least the voice application server, the computer station capable of accessing the network server and Website. An operator of the computer station creates and provides templates for the voice application server to use in data-to-voice rendering.

49 citations

01 Jan 2007
TL;DR: This paper proposes an approach that requires only minimal changes to existing commodity operating systems running on commodity hardware without compromising their functionality and compatibility, and implements a working prototype, CHAOS 1, that supports tamper-resistant applications running on Linux and Xen VMM.
Abstract: Software applications today face constant threat of tampering because of the vulnerability in operating systems and their permissive interface. Unfortunately, existing tamper-resistance approaches often require non-trivial amount of changes to core CPU architectures, operating systems and/or applications. In this paper, we propose an approach that requires only minimal changes to existing commodity operating systems running on commodity hardware without compromising their functionality and compatibility. The key idea is to use a trustworthy virtual machine monitor (VMM) to monitor and regulate the behavior of other untrustworthy processes including the underlying operating system that might have been compromised. We use the trusted VMM to compartmentalize a process that demands tamper resistant protection from OS kernels and other processes, by interposing security-sensitive operations (e.g. system calls) and isolating (and sealing) security-sensitive information (e.g. registers and memory). We have implemented a working prototype, CHAOS 1 , that supports tamper-resistant applications running on Linux and Xen VMM. Our prototype shows that it only requires minor changes (about 230 LOCs) to Linux and a small amount of code expansion to Xen (about 4200 LOCs). Performance measurements also show that CHAOS incurs a little performance degradation to the application software: about 3% for SPECINT-2000 and less than 15% for apache httpd and vsftpd.

49 citations

Proceedings ArticleDOI
Jonathan R. Agre1, A. Akinyemi1, Lusheng Ji1, R. Masuoka1, P. Thakkar1 
09 Mar 2002
TL;DR: The design of a location services module (LSM) that provides a foundation for location-aware services and several self-organizing protocols for cooperative location determination algorithms appropriate for wireless ad hoc networks are described.
Abstract: The design of a location services module (LSM) that provides a foundation for location-aware services is described. The architecture enhances application software development by providing a simple interface that hides details of the particular underlying location determination technologies. Functions for multiple technology switching, error estimation, location tracking, multiple technology fusion and cooperative location determination are defined. Several self-organizing protocols for cooperative location determination algorithms appropriate for wireless ad hoc networks are described. An example implementation of location-based services for a world wide web browser using an LSM is provided.

49 citations

Proceedings ArticleDOI
15 Aug 2011
TL;DR: The challenges encountered in globally dispersed software projects are presented and a proposal to exploit cloud computing characteristics and privileges both as a product and as a process to improve GSD is proposed.
Abstract: With the expansion of national markets beyond geographical limits, success of any business often depends on using software for competitive advantage. Furthermore, as technological boundaries are expanding, projects distributed across different geographical locations have become a norm for the software solution providers. Nevertheless, when implementing Global Software Development (GSD), organizations continue to face challenges in adhering to the development life cycle. The advent of the internet has supported GSD by bringing new concepts and opportunities resulting in benefits such as scalability, flexibility, independence, reduced cost, resource pools, and usage tracking. It has also caused the emergence of new challenges in the way software is being delivered to stakeholders. Application software and data on the cloud is accessed through services which follow SOA (Service Oriented Architecture) principles. In this paper, we present the challenges encountered in globally dispersed software projects. Based on goals mutually shared between GSD and the cloud computing paradigm, we propose to exploit cloud computing characteristics and privileges both as a product and as a process to improve GSD.

49 citations

Patent
18 Dec 2000
TL;DR: In this paper, an automated system and method for interactive scheduling through a web site is disclosed, which allows customers to schedule appointments at any time and from any location by accessing the vendor's appointment book or selecting the vendor from a list of vendors maintained at a scheduling web site.
Abstract: An automated system and method for interactive scheduling through a web site is disclosed. Vendors' appointment books are accessible through a web site so that customers may schedule appointments at any time and from any location. Customers access the vendor's appointment book by accessing the vendor's web site or selecting the vendor from a list of vendors maintained at a scheduling web site. Several cross-selling features are supported. In addition to scheduling a primary service, customers may schedule add-on and adjacent services that the vendor defines. Vendors who would like to establish a web site that uses special scheduling application software simply complete templates that comprise the content for the web site. A web site is then created for the vendor using service definitions and service provider information provided by the vendor.

49 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
87% related
User interface
85.4K papers, 1.7M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
82% related
Wireless
133.4K papers, 1.9M citations
82% related
Node (networking)
158.3K papers, 1.7M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202191
2020151
2019237
2018321
2017359
2016364