Sciweavers

190 search results - page 18 / 38
» P Systems, Petri Nets, and Program Machines
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
.NET Security: Lessons Learned and Missed from Java
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
BPM
2003
Springer
91views Business» more  BPM 2003»
14 years 25 days ago
Business Process Management: A Survey
Abstract. Business Process Management (BPM) includes methods, techniques, and tools to support the design, enactment, management, and analysis of operational business processes. It...
Wil M. P. van der Aalst, Arthur H. M. ter Hofstede...
PDP
2009
IEEE
14 years 2 months ago
PsycoTrace: Virtual and Transparent Monitoring of a Process Self
PsycoTrace is a set of tools to protect a process P from attacks that alter P self as specified by its source code. P self is specified in terms of legal traces of system calls ...
Fabrizio Baiardi, Dario Maggiari, Daniele Sgandurr...
DCOSS
2005
Springer
14 years 1 months ago
Database-Centric Programming for Wide-Area Sensor Systems
A wide-area sensor system is a complex, dynamic, resource-rich cloud of Internet-connected sensing devices. In this paper, we propose X-Tree Programming, a novel database-centric ...
Shimin Chen, Phillip B. Gibbons, Suman Nath
ACISICIS
2008
IEEE
14 years 2 months ago
An Integer Linear Programming Approach for Dedicated Machine Constraint
Dedicated machine constraint is one of the new challenges introduced in photolithography machinery of the semiconductor manufacturing system due to natural bias. Previous research...
Huy Nguyen Anh Pham, Arthur M. D. Shr, Peter P. Ch...