Sciweavers

1769 search results - page 38 / 354
» An implementation of argument based discussion
Sort
View
DSN
2005
IEEE
14 years 3 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
PC
2007
147views Management» more  PC 2007»
13 years 9 months ago
Thread-safety in an MPI implementation: Requirements and analysis
The MPI-2 Standard has carefully specified the interaction between MPI and usercreated threads. The goal of this specification is to allow users to write multithreaded MPI progr...
William Gropp, Rajeev Thakur
ENTCS
2007
85views more  ENTCS 2007»
13 years 10 months ago
Proving Approximate Implementations for Probabilistic I/O Automata
In this paper we introduce the notion of approximate implementations for Probabilistic I/O Automata (PIOA) and develop methods for proving such relationships. We employ a task str...
Sayan Mitra, Nancy A. Lynch
WISTP
2010
Springer
14 years 4 months ago
Towards Electrical, Integrated Implementations of SIMPL Systems
ct This paper discusses the practical implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems can be regarded as a public key versio...
Ulrich Rührmair, Qingqing Chen, Martin Stutzm...
CCGRID
2002
IEEE
14 years 2 months ago
Latency Performance of SOAP Implementations
Abstract— This paper presents an experimental evaluation of the latency performance of several implementations of Simple Object Access Protocol (SOAP) operating over HTTP, and co...
Dan Davis, Manish Parashar