Sciweavers

739 search results - page 74 / 148
» A security framework for the analysis and design of software...
Sort
View
SIGSOFT
1998
ACM
14 years 1 months ago
Reengineering Class Hierarchies Using Concept Analysis
The design of a class hierarchy may be imperfect. For example, a class C may contain a member m not accessed in any C-instance, an indication that m could be eliminated, or moved ...
Gregor Snelting, Frank Tip
PEPM
2010
ACM
14 years 5 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
ESCIENCE
2006
IEEE
14 years 2 months ago
A Middleware Framework for Maximum Likelihood Evaluation over Dynamic Grids
We have designed a maximum likelihood fitter using the actor model to distribute the computation over a heterogeneous network. The prototype implementation uses the SALSA program...
Wei-Jen Wang, Kaoutar El Maghraoui, John Cummings,...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
14 years 3 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
HPDC
2010
IEEE
13 years 10 months ago
A data transfer framework for large-scale science experiments
Modern scientific experiments can generate hundreds of gigabytes to terabytes or even petabytes of data that may furthermore be maintained in large numbers of relatively small fil...
Wantao Liu, Brian Tieman, Rajkumar Kettimuthu, Ian...