Sciweavers

597 search results - page 59 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
SIGSOFT
2006
ACM
14 years 8 months ago
How is aliasing used in systems software?
We present a study of all sources of aliasing in over one million lines of C code, identifying in the process the common patterns of aliasing that arise in practice. We find that ...
Brian Hackett, Alex Aiken
ICSE
2004
IEEE-ACM
14 years 7 months ago
GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions
A holy grail of component-based software engineering is "write-once, reuse everywhere". However, in modern distributed, component-based systems supporting emerging appli...
Eric Wohlstadter, Stefan Tai, Thomas A. Mikalsen, ...
CISIS
2010
IEEE
14 years 1 months ago
Bringing Introspection Into the BlobSeer Data-Management System Using the MonALISA Distributed Monitoring Framework
Abstract—Introspection is the prerequisite of an autonomic behavior, the first step towards a performance improvement and a resource-usage optimization for largescale distribute...
Alexandra Carpen-Amarie, Jing Cai, Alexandru Costa...
AMAST
2010
Springer
13 years 2 months ago
Matching Logic: An Alternative to Hoare/Floyd Logic
Abstract. This paper introduces matching logic, a novel framework for defining axiomatic semantics for programming languages, inspired from operational semantics. Matching logic sp...
Grigore Rosu, Chucky Ellison, Wolfram Schulte
IEEESCC
2007
IEEE
14 years 2 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung