Sciweavers

1938 search results - page 218 / 388
» Dependable Software
Sort
View
IPPS
2008
IEEE
14 years 3 months ago
Outlier detection in performance data of parallel applications
— When an adaptive software component is employed to select the best-performing implementation for a communication operation at runtime, the correctness of the decision taken str...
Katharina Benkert, Edgar Gabriel, Michael M. Resch
IEEEARES
2006
IEEE
14 years 3 months ago
Securing DNS Services through System Self Cleansing and Hardware Enhancements
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
Yih Huang, David Arsenault, Arun Sood
MSWIM
2006
ACM
14 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
UIST
2006
ACM
14 years 3 months ago
RecipeSheet: creating, combining and controlling information processors
Many tasks require users to extract information from diverse sources, to edit or process this information locally, and to explore how the end results are affected by changes in th...
Aran Lunzer, Kasper Hornbæk
HICSS
2005
IEEE
97views Biometrics» more  HICSS 2005»
14 years 2 months ago
Experiences with Conducting Project Postmortems: Reports vs. Stories and Practitioner Perspective
The most popular unit of work in organizations is a project. Managing knowledge in and about projects is salient for successful project management. Explicit knowledge is easier to...
Kevin C. Desouza, Torgeir Dingsøyr, Yukika ...