Sciweavers

1111 search results - page 166 / 223
» JDOS: A Jini Based Distributed Operating System
Sort
View
CONCUR
1999
Springer
14 years 1 months ago
Approximate Symbolic Model Checking of Continuous-Time Markov Chains
d abstract) Christel Baiera, Joost-Pieter Katoenb;c and Holger Hermannsc aLehrstuhl fur Praktische Informatik II, University of Mannheim 68131 Mannheim, Germany bLehrstuhl fur Info...
Christel Baier, Joost-Pieter Katoen, Holger Herman...
EDOC
2005
IEEE
14 years 2 months ago
Semantics of UML 2.0 Activity Diagram for Business Modeling by Means of Virtual Machine
— The paper proposes a more formalized definition of UML 2.0 Activity Diagram semantics. A subset of activity diagram constructs relevant for business process modeling is conside...
Valdis Vitolins, Audris Kalnins
HPCA
2009
IEEE
14 years 9 months ago
Fast complete memory consistency verification
The verification of an execution against memory consistency is known to be NP-hard. This paper proposes a novel fast memory consistency verification method by identifying a new na...
Yunji Chen, Yi Lv, Weiwu Hu, Tianshi Chen, Haihua ...
CN
2007
137views more  CN 2007»
13 years 8 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...