Web services allow authorized entities (including individuals, corporations, and automated agents) to employ software components created by other parties scattered across the glob...
Marcus Fontoura, Tobin J. Lehman, Dwayne Nelson, T...
This paper describes an experiment to use the Spin model checking system to support automated verification of time partitioning in the Honeywell DEOS real-time scheduling kernel. ...
John Penix, Willem Visser, Eric Engstrom, Aaron La...
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provi...
Graham N. C. Kirby, Alan Dearle, Angus Macdonald, ...
One vision of a context-aware pervasive networking environment promises the user a seamless access to surrounding services using her personal mobile device. This requires that the...