Sciweavers

839 search results - page 37 / 168
» Self-recovery in server programs
Sort
View
WWW
2007
ACM
14 years 9 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
IEEECIT
2009
IEEE
14 years 3 months ago
SLA-Aware Virtual Resource Management for Cloud Infrastructures
Cloud platforms host several independent applications on a shared resource pool with the ability to allocate computing power to applications on a per-demand basis. The use of serv...
Hien Nguyen Van, Frédéric Dang Tran,...
SIGSOFT
2005
ACM
14 years 2 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou
PPOPP
2003
ACM
14 years 2 months ago
Programming the FlexRAM parallel intelligent memory system
In an intelligent memory architecture, the main memory of a computer is enhanced with many simple processors. The result is a highly-parallel, heterogeneous machine that is able t...
Basilio B. Fraguela, Jose Renau, Paul Feautrier, D...
ECOOP
2009
Springer
14 years 9 months ago
Remote Batch Invocation for Compositional Object Services
Abstract. Because Remote Procedure Calls do not compose efficiently, designers of distributed object systems use Data Transfer and Remote Fac?ade patterns to create large-granulari...
Ali Ibrahim, Yang Jiao, Eli Tilevich, William R. C...