Sciweavers

1528 search results - page 250 / 306
» Performance Assertion Checking
Sort
View
CCS
2010
ACM
13 years 8 months ago
On verifying stateful dataflow processing services in large-scale cloud systems
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
Juan Du, Xiaohui Gu, Ting Yu
GLOBECOM
2008
IEEE
13 years 7 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
BMCBI
2007
80views more  BMCBI 2007»
13 years 7 months ago
AT excursion: a new approach to predict replication origins in viral genomes by locating AT-rich regions
Background: Replication origins are considered important sites for understanding the molecular mechanisms involved in DNA replication. Many computational methods have been develop...
David S. H. Chew, Ming-Ying Leung, Kwok Pui Choi
EJC
2008
13 years 7 months ago
Grad and classes with bounded expansion II. Algorithmic aspects
Abstract. Classes of graphs with bounded expansion are a generalization of both proper minor closed classes and degree bounded classes. Such classes are based on a new invariant, t...
Jaroslav Nesetril, Patrice Ossona de Mendez
FUIN
2008
147views more  FUIN 2008»
13 years 7 months ago
A Basic Logic for Reasoning about Connector Reconfiguration
Abstract. Software systems evolve over time. From a component-based software engineering perspective, this means that either the components of the system need to change, or, if com...
Dave Clarke