Sciweavers

739 search results - page 87 / 148
» Information Flow in Credential Systems
Sort
View
JUCS
2006
113views more  JUCS 2006»
13 years 9 months ago
A Collaborative Biomedical Research System
: The convergence of need between improved clinical care and post genomics research presents a unique challenge to restructuring information flow so that it benefits both without c...
Adel Taweel, Alan L. Rector, Jeremy Rogers
CCS
2010
ACM
13 years 9 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 3 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
JSS
2008
122views more  JSS 2008»
13 years 7 months ago
Traffic-aware stress testing of distributed real-time systems based on UML models using genetic algorithms
This report presents a model-driven, stress test methodology aimed at increasing chances of discovering faults related to network traffic in Distributed Real-Time Systems (DRTS). T...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
DAC
2007
ACM
14 years 10 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...