Sciweavers

890 search results - page 64 / 178
» Programming language methods in computer security
Sort
View
ISTA
2003
13 years 11 months ago
Managing Business Logic with Symbolic Computation
: A new approach of building enterprise distributed applications for layer of business rules as standard part of architecture is proposed in this paper. The approach uses symbolic ...
Ruslan Shevchenko, Anatoly E. Doroshenko
FM
2003
Springer
107views Formal Methods» more  FM 2003»
14 years 3 months ago
Verifying Emulation of Legacy Mission Computer Systems
Processor obsolescence is a serious maintenance problem for long-lived embedded control systems. A practical solution is to interpose an emulator program between the ‘legacy’ s...
Colin J. Fidge
HPCN
1995
Springer
14 years 1 months ago
A model-driven tool for performance measurement and analysis of parallel programs
The performance of parallel computing systems is strongly dependent on the runtime behaviour of parallel programs. This paper describes a new approach to measure and analyze the ru...
Xiandeng Huang, Christoph Steigner
HOTOS
1997
IEEE
14 years 2 months ago
Building Diverse Computer Systems
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advan...
Stephanie Forrest, Anil Somayaji, David H. Ackley
JAVA
1999
Springer
14 years 2 months ago
The Gateway System: Uniform Web Based Access to Remote Resources
Exploiting our experience developing the WebFlow system, we designed the Gateway system to provide seamless and secure access to computational resources at ASC MSRC. The Gateway f...
Geoffrey Fox, Tomasz Haupt, Erol Akarsu, Alexey Ka...