Sciweavers

438 search results - page 61 / 88
» Defending Critical Infrastructure
Sort
View
ACSAC
1999
IEEE
14 years 2 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
IWCC
1999
IEEE
14 years 2 months ago
Design and Analysis of the Alliance/University of New Mexico Roadrunner Linux SMP SuperCluster
This paper will discuss high performance clustering from a series of critical topics: architectural design, system software infrastructure, and programming environment. This will ...
David A. Bader, Arthur B. Maccabe, Jason R. Mastal...
ATAL
2006
Springer
14 years 1 months ago
Synergistic integration of agent technologies for military simulation
To perform large-scale coordination in real-world environments requires that many individually complex technologies come together to form integrated solutions. In this paper, we p...
Sean Owens, Paul Scerri, Robin Glinton, Bin Yu, Ka...
DSN
2000
IEEE
14 years 1 months ago
Survivability Analysis of Network Specifications
Survivabilityis the ability of a system to maintain a set of essential services despite the presence of abnormal events such as faults and intrusions. Ensuring system survivabilit...
Sanjay K. Jha, Jeannette M. Wing, Richard C. Linge...
ECOWS
2009
Springer
14 years 1 months ago
Run-time Verification of Behavioural Conformance for Conversational Web Services
— Web services exposing run-time behaviour that deviates from their behavioural specifications represent a major threat to the sustainability of a service-oriented ecosystem. It ...
Dimitris Dranidis, Ervin Ramollari, Dimitrios Kour...