Sciweavers

927 search results - page 107 / 186
» Practical Limits on Software Dependability: A Case Study
Sort
View
WOSP
2005
ACM
14 years 1 months ago
A capacity management service for resource pools
Resource pools are computing environments that offer virtualized access to shared resources. When used effectively they can align the use of capacity with business needs (flexi...
Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt,...
SERP
2010
13 years 5 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight
ECOOPWEXCEPTION
2006
Springer
13 years 11 months ago
Exception-Handling Bugs in Java and a Language Extension to Avoid Them
It is difficult to write programs that behave correctly in the presence of exceptions. We describe a dataflow analysis for finding a certain class of mistakes made while programs h...
Westley Weimer
DLOG
2000
13 years 9 months ago
Adapting Optimization Techniques to Description Logics with Concrete Domains
In this paper, we demonstrate that the main standard optimization techniques dependency directed backtracking and model merging can be adapted to description logics with concrete ...
Anni-Yasmin Turhan, Volker Haarslev
SPE
2002
141views more  SPE 2002»
13 years 7 months ago
Data collection and restoration for heterogeneous process migration
This study presents a practical solution for data collection and restoration to migrate a process written in high level stack-based languages such as C and Fortran over a network ...
Kasidit Chanchio, Xian-He Sun