Sciweavers

1005 search results - page 175 / 201
» Information systems security engineering: a critical compone...
Sort
View
OOPSLA
2009
Springer
14 years 3 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...
EUROSYS
2009
ACM
14 years 5 months ago
Improving the responsiveness of internet services with automatic cache placement
The backends of today’s Internet services rely heavily on caching at various layers both to provide faster service to common requests and to reduce load on back-end components. ...
Alexander Rasmussen, Emre Kiciman, V. Benjamin Liv...
CSE
2009
IEEE
14 years 3 months ago
Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing.com
—Reputation mechanisms are essential for online transactions, where the parties have little prior experience with one another. This is especially true when transactions result in...
Debra Lauterbach, Hung Truong, Tanuj Shah, Lada A....
ECRTS
2002
IEEE
14 years 1 months ago
Fully Automatic Worst-Case Execution Time Analysis for Matlab/Simulink Models
In today’s technical world (e.g., in the automotive industry), more and more purely mechanical components get replaced by electro-mechanical ones. Thus the size and complexity o...
Raimund Kirner, Roland Lang, Gerald Freiberger, Pe...
EOR
2006
117views more  EOR 2006»
13 years 8 months ago
Heuristics for selecting robust database structures with dynamic query patterns
The success of a company increasingly depends on timely information (internal or external) being available to the right person at the right time for crucial managerial decision-ma...
Andrew N. K. Chen, Paulo B. Goes, Alok Gupta, Jame...