Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
The use of modern programming paradigms and technologies, such as object orientation, inheritance, polymorphism and aspect orientation, facilitate a number of important software e...
Michael Desmond, Margaret-Anne D. Storey, Chris Ex...
Middleware facilitates the development of distributed systems by accommodating heterogeneity, hiding distribution details and providing a set of common and domain specific service...
Data parallel languages such as Vienna Fortran and HPF can be successfully applied to a wide range of numerical applications. However, many advanced scientic and engineering appl...
Barbara M. Chapman, Piyush Mehrotra, John Van Rose...