Sciweavers

2013 search results - page 276 / 403
» Analysis and Design Techniques for Service-Oriented Developm...
Sort
View
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 3 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
KCAP
2009
ACM
14 years 3 months ago
POIROT: acquiring workflows by combining models learned from interpreted traces
The POIROT project is a four-year effort to develop an architecture that integrates the products of a number of targeted reasoning and learning components to produce executable re...
Mark H. Burstein, Fusun Yaman, Robert Laddaga, Rob...
ETFA
2008
IEEE
14 years 3 months ago
Real-time enabled debugging for distributed systems
The distribution of real-time tasks in a networked environment in principle has several advantages, above all a high degree of flexibility easing system extension and replacement...
Georg Gaderer, Patrick Loschmidt, Thilo Sauter
HYBRID
2005
Springer
14 years 2 months ago
Interchange Formats for Hybrid Systems: Review and Proposal
Interchange formats have been the backbone of the EDA industry for several years. They are used as a way of helping the development of design flows that integrate foreign tools us...
Alessandro Pinto, Alberto L. Sangiovanni-Vincentel...
HPCN
1999
Springer
14 years 1 months ago
Towards a Scalable Metacomputing Storage Service
We describe a prototypical storage service through which we are addressing some of the open storage issues in wide-area distributed high-performance computing. We discuss some of t...
Craig J. Patten, Kenneth A. Hawick, J. F. Hercus