Sciweavers

1360 search results - page 237 / 272
» Reasoning on Workflow Executions
Sort
View
SAC
2006
ACM
14 years 2 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
ISLPED
2005
ACM
86views Hardware» more  ISLPED 2005»
14 years 2 months ago
An evaluation of code and data optimizations in the context of disk power reduction
Disk power management is becoming increasingly important in high-end server and cluster type of environments that execute dataintensive applications. While hardware-only approache...
Mahmut T. Kandemir, Seung Woo Son, Guangyu Chen
AOSE
2005
Springer
14 years 2 months ago
Operational Modelling of Agent Autonomy: Theoretical Aspects and a Formal Language
Autonomy has always been conceived as one of the defining attributes of intelligent agents. While the past years have seen considerable progress regarding theoretical aspects of a...
Gerhard Weiß, Felix A. Fischer, Matthias Nic...
EMSOFT
2005
Springer
14 years 2 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
OOPSLA
2005
Springer
14 years 2 months ago
Safe futures for Java
is a simple and elegant abstraction that allows concurrency to be expressed often through a relatively small rewrite of a sequential program. In the absence of side-effects, futur...
Adam Welc, Suresh Jagannathan, Antony L. Hosking