Sciweavers

88 search results - page 13 / 18
» Access Control Based on Code Identity for Open Distributed S...
Sort
View
TGC
2005
Springer
14 years 28 days ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
INFOCOM
2006
IEEE
14 years 1 months ago
Data Synchronization Methods Based on ShuffleNet and Hypercube for Networked Information Systems
– In contrast to a typical single source of data updates in Internet applications, data files in a networked information system are often distributed, replicated, accessed and up...
David J. Houck, Kin K. Leung, Peter Winkler
CASES
2005
ACM
13 years 9 months ago
Exploiting pipelining to relax register-file port constraints of instruction-set extensions
Customisable embedded processors are becoming available on the market, thus making it possible for designers to speed up execution of applications by using Application-specific F...
Laura Pozzi, Paolo Ienne
ICSM
2006
IEEE
14 years 1 months ago
Establishing Maintainability in Systems Integration: Ambiguity, Negotiations, and Infrastructure
This paper investigates how maintainability can be established in system integration (SI) projects where maintainers have no direct access to the source code of the third-party so...
Thomas Østerlie, Alf Inge Wang
PPPJ
2009
ACM
14 years 2 months ago
Tracking performance across software revisions
Repository-based revision control systems such as CVS, RCS, Subversion, and GIT, are extremely useful tools that enable software developers to concurrently modify source code, man...
Nagy Mostafa, Chandra Krintz