scispace - formally typeset
Search or ask a question
Topic

Database-centric architecture

About: Database-centric architecture is a research topic. Over the lifetime, 1799 publications have been published within this topic receiving 48836 citations.


Papers
More filters
Proceedings ArticleDOI
01 Jan 2005
TL;DR: This paper describes such ideal software architecture, resulted from an iterative process seeking a Web-based, secure, scalable, multiuser, multi-device WebLab.
Abstract: Traditionally the focus on WebLab design has been placed on the hardware side, i.e. enabling data and program transfer between a PC remotely accessible through TCP/IP and its attached controllable/programmable device. Little attention has been paid to the other communication segment going from the controlling PC (WebLab server) and the remote users' PCs, since this has been regarded as a "solved software problem". Consequently, aspects such as security, scalability, accessibility, user friendliness, or the possibility of collaborative work in WebLabs have often been disregarded. This situation may be resolved if a serious effort is placed on the definition of a proper distributed software architecture for WebLabs. In this paper, we describe such ideal software architecture, resulted from an iterative process seeking a Web-based, secure, scalable, multiuser, multi-device WebLab.

18 citations

Journal ArticleDOI
TL;DR: A new approach is introduced for the design of Multi-User Real-Time Computer Networks called "Functional Distribution", which leads to a system architecture called "functional Distribution".
Abstract: A new approach is introduced for the design of Multi-User Real-Time Computer Networks. The approach leads to a system architecture called "Functional Distribution". Definitions of the concept and key issues of a practical implementation are discussed using as an example a Multi-User Experiment Control System. The discussion also includes the architecture of that hardware which has been traditionally referred to as the "interface between an experiment and a computer".

18 citations

Journal ArticleDOI
TL;DR: A data-intensive architecture that demonstrates the ability to support applications from a wide range of application domains, and support the different types of users involved in defining, designing and executing data- intensive processing tasks, is presented.
Abstract: This paper presents a data-intensive architecture that demonstrates the ability to support applications from a wide range of application domains, and support the different types of users involved in defining, designing and executing data-intensive processing tasks. The prototype architecture is introduced, and the pivotal role of DISPEL as a canonical language is explained. The architecture promotes the exploration and exploitation of distributed and heterogeneous data and spans the complete knowledge discovery process, from data preparation, to analysis, to evaluation and reiteration. The architecture evaluation included large-scale applications from astronomy, cosmology, hydrology, functional genetics, imaging processing and seismology.

18 citations

DOI
01 Oct 2002
TL;DR: The purpose of this technical note is to describe, using a hypothetical example, the alignment, combination, and uses of the two methods for analyzing system and software architectures, the Quality Attribute Workshop and the Architecture Tradeoff Analysis MethodSM.
Abstract: The Software Engineering Institute (SEI) has developed two methods for analyzing system and software architectures—the Quality Attribute Workshop (QAW) and the Architecture Tradeoff Analysis Method (ATAM). These techniques, which are described in detail in various SEI technical reports and on the SEI Web site, can be used in combination to obtain early and continuous benefits. Designed to complement the ATAM, the QAW provides a method for analyzing a conceptual architecture or a system architecture against a number of critical quality attributes—such as availability, performance, security, interoperability, and modifiability—before the software architecture is fully developed. Once the software architecture is developed, the ATAM can be used to reveal how well the architecture satisfies particular quality attribute requirements and the risks, sensitivities, and tradeoffs involved in satisfying the requirements. The purpose of this technical note is to describe, using a hypothetical example, the alignment, combination, and uses of the two methods.

18 citations

Book ChapterDOI
11 May 1997
TL;DR: In this paper, the authors show that the new generation of MD4-based customized hash functions (RIPEMD-128, RIPEMD160, SHA-1) contains much more software parallelism than any of these computer architectures is currently able to provide.
Abstract: To enhance system performance computer architectures tend to incorporate an increasing number of parallel execution units. This paper shows that the new generation of MD4-based customized hash functions (RIPEMD-128, RIPEMD-160, SHA-1) contains much more software parallelism than any of these computer architectures is currently able to provide. It is conjectured that the parallelism found in SHA-1 is a design principle. The critical path of SHA-1 is twice as short as that of its closest contender RIPEMD-160, but realizing it would require a 7-way multiple-issue architecture. It will also be shown that, due to the organization of RIPEMD-160 in two independent lines, it will probably be easier for future architectures to exploit its software parallelism.

18 citations


Network Information
Related Topics (5)
Software development
73.8K papers, 1.4M citations
89% related
Server
79.5K papers, 1.4M citations
85% related
Mobile computing
51.3K papers, 1M citations
83% related
Quality of service
77.1K papers, 996.6K citations
82% related
Wireless sensor network
142K papers, 2.4M citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20236
202220
20216
20208
201914
201821