Sciweavers

204 search results - page 26 / 41
» A case study on model driven data integration for data centr...
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
ISVC
2010
Springer
13 years 6 months ago
Subversion Statistics Sifter
We present Subversion Statistics Sifter, a visualisation and statistics system for exploring the structure and evolution of data contained in Subversion repositories with respect t...
Christoph Müller, Guido Reina, Michael Burch,...
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
JUCS
2010
152views more  JUCS 2010»
13 years 2 months ago
Compositional Semantics of Dataflow Networks with Query-Driven Communication of Exact Values
: We develop and study the concept of dataflow process networks as used for example by Kahn to suit exact computation over data types related to real numbers, such as continuous fu...
Michal Konecný, Amin Farjudian
VMCAI
2009
Springer
14 years 2 months ago
Model-Checking the Linux Virtual File System
This paper presents a case study in modelling and verifying the Linux Virtual File System (VFS). Our work is set in the context of Hoare’s verification grand challenge and, in p...
Andy Galloway, Gerald Lüttgen, Jan Tobias M&u...