Interceptor pattern

Known as: Interceptor 
In the field of software development, an interceptor pattern is a software design pattern that is used when software systems or frameworks want to… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
It has become more and more obvious that in Cloud Computing, applications are key drivers to make Cloud business a success. Multi… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
A new smooth second-order sliding mode control (SSOSM) is proposed and proved for a system driven by uncertain sufficiently… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
A new smooth second-order sliding mode control is proposed and proved using homogeneity-based technique for a system driven by… (More)
  • figure 1
  • figure 2
Is this relevant?
2005
2005
Monitoring critical events such as constraints violations is one of the key issues of autonomic systems. This paper presents an… (More)
  • figure 3
  • figure 4
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Previously we reported that when cells from the human transitional cell carcinoma cell line 253J B-V growing orthotopically… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
T he integration of distributed computing and the object model leads to distributed object computing, in which objects rather… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Although hepatitis C virus (HCV) infection is an emerging global epidemic causing severe liver disorders, the molecular… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In CORBA-based applications that depend on object replication for fault tolerance, inconsistencies in the states of the replicas… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1997
1997
The Eternal system is a CORBA 2.0-compliant system that provides, in addition to the location transparency and the… (More)
  • figure 9
  • figure 8
  • figure 7
  • figure 5
  • figure 6
Is this relevant?