Sciweavers

307 search results - page 58 / 62
» On the Integrity of Lightweight Checkpoints
Sort
View
HYBRID
2010
Springer
14 years 15 days ago
Safe compositional network sketches: formal framework
NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch assists system integr...
Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Mi...
SIGMOD
2000
ACM
99views Database» more  SIGMOD 2000»
13 years 11 months ago
WSQ/DSQ: A Practical Approach for Combined Querying of Databases and the Web
We present WSQ/DSQ (pronounced “wisk-disk”), a new approach for combining the query facilities of traditional databases with existing search engines on the Web. WSQ, for Web-S...
Roy Goldman, Jennifer Widom
AINA
2010
IEEE
13 years 11 months ago
Requirements for Distributed Event-Based Awareness in P2P Groupware Systems
One of the major premises of P2P systems is to enable fully decentralized collaborative functionalities for supporting work teams and P2P communities. Within collaborative systems,...
Fatos Xhafa, Alex Poulovassilis
FORMATS
2007
Springer
13 years 11 months ago
Combining Formal Verification with Observed System Execution Behavior to Tune System Parameters
Resource limited DRE (Distributed Real-time Embedded) systems can benefit greatly from dynamic adaptation of system parameters. We propose a novel approach that employs iterative t...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
13 years 11 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan