Sciweavers

250 search results - page 16 / 50
» Automatically constructing trusted cluster computing environ...
Sort
View
CCS
2009
ACM
14 years 1 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
ACMSE
2006
ACM
14 years 21 days ago
Automatic support for testing web-based enterprise applications
In this paper we consider the problem of automatically generating test suites associated with web-based enterprise systems. In particular, we discuss the construction of a tool de...
Arturo Sanchez, Brandon Vega, Alexander Gonzalez, ...
JPDC
2006
100views more  JPDC 2006»
13 years 6 months ago
Dyn-MPI: Supporting MPI on medium-scale, non-dedicated clusters
Distributing data is a fundamental problem in implementing efficient distributed-memory parallel programs. The problem becomes more difficult in environments where the participati...
D. Brent Weatherly, David K. Lowenthal, Mario Naka...
CHI
1995
ACM
13 years 10 months ago
SageTools: an intelligent environment for sketching, browsing, and customizing data-graphics
Our approach views data-graphic design as two complementary processes: design as a constructive process of selecting and arranging graphical elements, and design as a process of b...
Steven F. Roth, John Kolojejchick, Joe Mattis, Mei...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
14 years 11 hour ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...