Sciweavers

1005 search results - page 134 / 201
» Information systems security engineering: a critical compone...
Sort
View
ICSE
1997
IEEE-ACM
14 years 1 months ago
Visualizing Interactions in Program Executions
Implementing, validating, modifying, or reengineering an object-oriented system requires an understanding of the object and class interactions which occur as a program executes. T...
Dean F. Jerding, John T. Stasko, Thomas Ball
SOSP
2003
ACM
14 years 5 months ago
Performance debugging for distributed systems of black boxes
Many interesting large-scale systems are distributed systems of multiple communicating components. Such systems can be very hard to debug, especially when they exhibit poor perfor...
Marcos Kawazoe Aguilera, Jeffrey C. Mogul, Janet L...
CIKM
2005
Springer
14 years 2 months ago
Implicit user modeling for personalized search
Information retrieval systems (e.g., web search engines) are critical for overcoming information overload. A major deficiency of existing retrieval systems is that they generally...
Xuehua Shen, Bin Tan, ChengXiang Zhai
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 6 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
CORR
2008
Springer
88views Education» more  CORR 2008»
13 years 9 months ago
The Korrontea Data Modeling
Needs of multimedia systems evolved due to the evolution of their architecture which is now distributed into heterogeneous contexts. A critical issue lies in the fact that they ha...
Emmanuel Bouix, Philippe Roose, Marc Dalmau