Sciweavers

1754 search results - page 319 / 351
» Grid Services Toolkit for Process Data Processing
Sort
View
FASE
2009
Springer
14 years 3 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
RTSS
2009
IEEE
14 years 3 months ago
Timing Analysis of Concurrent Programs Running on Shared Cache Multi-Cores
—Memory accesses form an important source of timing unpredictability. Timing analysis of real-time embedded software thus requires bounding the time for memory accesses. Multipro...
Yan Li, Vivy Suhendra, Yun Liang, Tulika Mitra, Ab...
CHIMIT
2009
ACM
14 years 3 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
ACSAC
2008
IEEE
14 years 3 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
GLOBECOM
2008
IEEE
14 years 3 months ago
Networked Embedded Systems: A Quantitative Performance Comparison
— Networked embedded systems are gaining more and more attention and their use in current network scenarios is of indisputable importance. Research community and industry are pro...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...