Sciweavers

1406 search results - page 245 / 282
» Information Flow in Systems with Schedulers
Sort
View
LCPC
1994
Springer
13 years 11 months ago
Minimal Data Dependence Abstractions for Loop Transformations
Data Dependence Abstractions for Loop Transformations Yi-Qing Yang Corinne Ancourt Francois Irigoin Ecole des Mines de Paris/CRI 77305 Fontainebleau Cedex France tractions of prog...
Yi-Qing Yang, Corinne Ancourt, François Iri...
IEEECIT
2010
IEEE
13 years 6 months ago
Developing a Cloud Computing Charging Model for High-Performance Computing Resources
Abstract—This paper examines the economics of cloud computing charging from the perspective of a supercomputing resource provider offering its own resources. To evaluate the comp...
Matthew Woitaszek, Henry M. Tufo
ICDE
2006
IEEE
204views Database» more  ICDE 2006»
14 years 9 months ago
Collaborative Business Process Support in IHE XDS through ebXML Business Processes
Currently, clinical information is stored in all kinds of proprietary formats through a multitude of medical information systems available on the market. This results in a severe ...
Asuman Dogac, Veli Bicer, Alper Okcan
WWW
2010
ACM
14 years 29 days ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
TPDS
2008
78views more  TPDS 2008»
13 years 7 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...