The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CICS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1986 (15) 1987-1988 (17) 1989-1991 (19) 1992-1996 (17) 1997-2006 (17) 2007-2009 (38) 2011 (29) 2013-2014 (26) 2015-2021 (7)
Publication types (Num. hits)
article(29) book(1) inproceedings(151) proceedings(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 67 occurrences of 50 keywords

Results
Found 185 publication records. Showing 185 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
199Tangjianfeng, Huangxianbin, Wangjicheng Research of mainframe CICS application integration using CICS SCA. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SOA, integration, SCA, CICS, mainframe
105Nandita Chaudhri, Shefali S. Dash Community information centers: e-governance at subdistrict level: a case study. Search on Bibsonomy ICEGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF citizen services, internet kiosks, permanent account number (PAN), telecentres, education, e-governance, IT, entertainment, information services
84Shefali S. Dash, Nandita Chaudhri Community information centres---enabling e-governance in India: lessons learnt. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF citizen services, internet kiosks, tele-centres, education, e-governance, entertainment, information services
65Leo Freitas, Konstantinos Mokos, Jim Woodcock 0001 Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository. Search on Bibsonomy ICECCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
63Kun Lu, Fengqi Li, Jizhen Niu, Ling Xie Design and Realization of High-Reliability Courses Selection System Based on Mainframe. Search on Bibsonomy CSSE (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Alex Sellink, Chris Verhoef, Harry M. Sneed Restructuring of COBOL/CICS Legacy Systems. Search on Bibsonomy CSMR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Teleprocessing system, Control-flow normalization, Repartitioning, Reengineering, COBOL, Transaction processing system, System renovation, Remodularization, CICS
50Kenneth Fussichen Ada and CICS: or (yes! Ada can be done on an IBM Mainframe). Search on Bibsonomy TRI-Ada The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Ada, CICS
47 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014 Search on Bibsonomy CICS The full citation details ... 2014 DBLP  BibTeX  RDF
47Eray Balkanli, Jander Alves, Nur Zincir-Heywood Supervised learning to detect DDoS attacks. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Khalid Shahbar, Nur Zincir-Heywood Benchmarking two techniques for Tor classification: Flow level and circuit level classification. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Sebastian Obermeier 0001, Michael Wahler, Thanikesavan Sivanthi, Roman Schlegel, Aurelien Monot Automatic attack surface reduction in next-generation industrial control systems. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Foaad Khosmood, Phillip L. Nico, Jonathan Woolery User identification through command history analysis. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani Thuraisingham, Joey Burton Ingram Spark-based anomaly detection over multi-source VMware performance data in real-time. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Ugur Pehlivan, Nuray Baltaci, Cengiz Acartürk, Nazife Baykal The analysis of feature selection methods and classification algorithms in permission based Android malware detection. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47El-Sayed M. El-Alfy, Ali A. Al-Hasan A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Carlos A. S. Assis, Adriano César Machado Pereira, Marconi de Arruda Pereira, Eduardo G. Carrano A genetic programming approach for fraud detection in electronic transactions. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Arisoa S. Randrianasolo, Larry D. Pyeatt A theoretical Q-learning temporary security repair. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 Quantifying the impact of unavailability in cyber-physical environments. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Karel P. Bergmann, Jörg Denzinger Automated testing for cyber threats to ad-hoc wireless networks. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47Dipankar Dasgupta, Denise Ferebee, Sanjib Kumar Saha, Abhijit Kumar Nag, Kul Prasad Subedi, Alvaro Madero, Abel Sanchez, John R. Williams G-NAS: A grid-based approach for negative authentication. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47El-Sayed M. El-Alfy, Asem A. Ghaleb Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
47 Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore Search on Bibsonomy CICS The full citation details ... 2013 DBLP  BibTeX  RDF
47Hossein Rahimi, Nur Zincir-Heywood, Bharat Gadher Indoor geo-fencing and access control for wireless networks. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47Kesav Kancherla, Srinivas Mukkamala Image visualization based malware detection. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47Sanjay Rawat 0001, Fabien Duchene, Roland Groz, Jean-Luc Richier Evolving indigestible codes: Fuzzing interpreters with genetic programming. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47Hector M. Lugo-Cordero, Ratan K. Guha What defines an intruder? An intelligent approach. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47Mahendra Piraveenan, Shahadat Uddin, Kon Shing Kenneth Chung, Dharshana Kasthurirathna Quantifying encircling behaviour in complex networks. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47Marcos Álvares Barbosa Junior, Tshilidzi Marwala, Fernando Buarque de Lima Neto Applications of computational intelligence for static software checking against memory corruption vulnerabilities. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47Simon Miller, Jonathan M. Garibaldi, Susan Appleby Evolving OWA operators for cyber security decision making problems. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47S. Ganesh Babu, Ilango Paramasivam Higher dimensional chaos for Audio encryption. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta Resilient hybrid overlay model for smart grid: RHM for smart grid. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47Chirag Modi 0001, Dhiren R. Patel A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011 Search on Bibsonomy CICS The full citation details ... 2011 DBLP  BibTeX  RDF
47Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila Addressing the need for independence in the CSE model. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Scott Musman, Mike Tanner, Aaron Temin, Evan Elsaesser, Lewis Loren A systems engineering approach for crown jewels estimation and mission assurance decision making. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Anita Zakrzewska, Erik M. Ferragut Modeling cyber conflicts using an extended Petri Net formalism. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Erik M. Ferragut, David M. Darmon, Craig Aaron Shue, Stephen Kelley Automatic construction of anomaly detectors from graphical models. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Ran Liu, Wenjian Luo, Xufa Wang A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Justin M. Beaver, Robert M. Patton, Thomas E. Potok An approach to the automated determination of host information value. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Amal Ben Hamida, Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas Hierarchical traceability of multimedia documents. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Yi Hu, Charles E. Frank, James Walden, Emily Crawford, Dhanuja Kasturiratna Profiling file repository access patterns for identifying data exfiltration activities. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Paul K. Harmer, Ryan W. Thomas, Brady Christel, Richard K. Martin, Clifton Watson Wireless security situation awareness with attack identification decision support. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas A scalable architecture for improving the timeliness and relevance of cyber incident notifications. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Justin Zhan, Xing Fang, Peter Killion Trust optimization in task-oriented social networks. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Omar Al-Ibrahim, Suku Nair Security fusion based on state machine compositions. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Dean Lee, Samuel N. Hamilton, Wendy L. Hamilton Modeling Cyber Knowledge uncertainty. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Sara Hajian, Josep Domingo-Ferrer, Antoni Martínez-Ballesté Discrimination prevention in data mining for intrusion and crime detection. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Martin Rehák, Jan Stiborek, Martin Grill Intelligence, not integration: Distributed regret minimization for IDS Control. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Senhua Yu, Dipankar Dasgupta An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Justin Zhan, Lijo Thomas Phishing detection using stochastic learning-based weak estimators. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Justin Zhan, Xing Fang, Naveen Bandaru Location privacy protection on social networks. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Jennifer T. Jackson, Sadie Creese, Mark S. Leeson Biodiversity: A security approach for ad hoc networks. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47David L. Hancock, Gary B. Lamont Multi agent systems on military networks. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi A host based DES approach for detecting ARP spoofing. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu Security visualization: Cyber security storm map and event correlation. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Carlos Bacquet, Nur Zincir-Heywood, Malcolm I. Heywood Genetic optimization and hierarchical clustering applied to encrypted traffic identification. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood Exploring the state space of an application protocol: A case study of SMTP. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Ondrej Linda, Milos Manic, Todd Vollmer, Jason L. Wright Fuzzy logic based anomaly detection for embedded network security cyber sensor. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Todd Vollmer, Jim Alves-Foss, Milos Manic Autonomous rule creation for intrusion detection. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009 Search on Bibsonomy CICS The full citation details ... 2009 DBLP  BibTeX  RDF
47Masanoei Hara, Akira Yamada 0001, Yutaka Miyake Visual similarity-based phishing detection without victim site information. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Hoin Kim, Inyong Lee, Jaeik Cho, Jongsub Moon Visualization of network components for attack analysis. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers Using qualia and multi-layered relationships in malware detection. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar Detection of intrusive activity in databases by combining multiple evidences and belief update. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta Visualization of security events using an efficient correlation technique. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Eric S. Imsand, Deon Garrett, John A. Hamilton Jr. User identification using GUI manipulation patterns and artificial neural networks. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Li Yang 0001, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege Discovering topics from dark websites. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Joseph A. Brown, Sheridan K. Houghten, Beatrice M. Ombuki-Berman Genetic algorithm cryptanalysis of a substitution permutation network. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee Email worm detection by wavelet analysis of DNS query streams. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Dipankar Dasgupta Tutorial: computational intelligence in cyber security. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka Generating mimicry attacks using genetic programming: A benchmarking study. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Siddharth Gujral, Estefan Ortiz, Vassilis L. Syrmos An unsupervised method for intrusion detection using spectral clustering. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Sourour Meharouech, Adel Bouhoula, Tarek Abbes Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson Network security using self organized multi agent swarms. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Chet Langin, Hongbo Zhou 0001, Shahram Rahimi 0001, Bidyut Gupta, Mehdi R. Zargham, Mohammad R. Sayeh A self-organizing map and its modeling for discovering malignant network traffic. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Stephen Torri, Winard Britt, John A. Hamilton Jr. A compiler classification framework for use in reverse engineering. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Jiang Bian 0001, Remzi Seker JigDFS: A secure distributed file system. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Manhyun Chung, Jaeik Cho, Jongsub Moon An effective denial of service detection method using kernel based data. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Archana Bhattarai, Vasile Rus, Dipankar Dasgupta Characterizing comment spam in the blogosphere through content analysis. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Minsoo Lee, Xiaohui Ye, Samuel D. Johnson, Dan Marconett, Chaitanya S. K. Vadrevu, Rao Vemuri 0001, S. J. Ben Yoo Cognitive security management with reputation based cooperation schemes in heterogeneous networks. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 Managing complex IT security processes with value based measures. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Ran Tao, Li Yang 0001, Lu Peng 0001, Bin Li 0008, Alma Cemerlic A case study: Using architectural features to improve sophisticated denial-of-service attack detections. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Riyad Alshammari, Nur Zincir-Heywood Generalization of signatures for SSH encrypted traffic identification. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Ochul Kwon, Seongjae Bae, Jaeik Cho, Jongsub Moon Study of fuzzy clustering methods for malicious codes using native API call frequency. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Sahin Renckes, Huseyin Polat 0001, Yusuf Oysal Finding the state sequence maximizing P(O; I|λ) on distributed HMMs with Privacy. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Rajesh Kumar Pal, Indranil Sengupta 0001 Enhancing file data security in linux operating system by integrating secure file system. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Fred Stefan, Paul Herrmann 0001, Wilhelm G. Spruth Was geschrieben ist, ist geschrieben - Legacy CICS-Anwendungen im neuen Gewand (What is written, is written - Modern Legacy CICS-Applications). Search on Bibsonomy it Inf. Technol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Ted C. Keller CPU Usage in CICS/ESA and CICS/MVS Measures, Meanings, and Applications. Search on Bibsonomy Int. CMG Conference The full citation details ... 1992 DBLP  BibTeX  RDF
47H. W. Barry Merrill Performance Evaluation of CICS Using SAS and the CICS Performance Analyzer Data. Search on Bibsonomy Int. CMG Conference The full citation details ... 1979 DBLP  BibTeX  RDF
44Johanna Ekua Awotwi, George Owusu Ghana's community information centers (CiCs): e-governance success or mirage? Search on Bibsonomy ICEGOV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF community information centres, telecentres, e-governance, digital divide, mobile telephony, illiteracy
44Tang Jianfeng, Zhang Xianing Mainframe Application Transition to SOA Environment Using CICS Service Flow Feature. Search on Bibsonomy CSSE (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Jonathan Hoare, Jeremy Dick, David Neilson, Ib Holm Sørensen Applying the B Technologies on CICS. Search on Bibsonomy FME The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
44Hilton Chen, Wayne Summers IBM 3270 full screen interactive programming without CICS. Search on Bibsonomy SIGCSE The full citation details ... 1988 DBLP  DOI  BibTeX  RDF COBOL
42C. Mohan 0001 Tutorial: application servers and associated technologies. Search on Bibsonomy SIGMOD Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Java, XML
27Marc Beyerle, Joachim Franz, Wilhelm G. Spruth Persistent Reusable Java Virtual Machine unter z/OS und Linux. Search on Bibsonomy Inform. Forsch. Entwickl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ACID, Persistent Reusable Java Virtual Machine, PRJVM, OS/390, Serial Reusability, zLinux, z/OS, zSeries, Transaction, JVM, IMS, J2EE, DB2, EJB, WebSphere, CICS
27Olaf Zimmermann, Sven Milinski, Michael Craes, Frank Oellermann Second generation web services-oriented architecture in production in the finance industry. Search on Bibsonomy OOPSLA Companion The full citation details ... 2004 DBLP  DOI  BibTeX  RDF core banking, web services, XML, service-oriented architecture, software architecture, compression, web application, business process, HTTP, XML schema, SOAP, enterprise application integration, WSDL, application server, UDDI, webSphere, CICS
27Harry M. Sneed Generation of Stateless Components from Procedural Programs for Reuse in a Distributed System. Search on Bibsonomy CSMR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Stateless Components, Host Networking, Reengineering, Intranet, COBOL, Client/Server, Wrapping, CICS
27J. H. Chang, H. H. Chao, K. Lewis, M. Holland Control store implementation of a high performance VLSI CISC. Search on Bibsonomy MICRO The full citation details ... 1988 DBLP  BibTeX  RDF CICS/VS
Displaying result #1 - #100 of 185 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license