Sciweavers

471 search results - page 40 / 95
» Social applications: exploring a more secure framework
Sort
View
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
13 years 2 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...
HUMAN
2003
Springer
14 years 1 months ago
The Role of the Internet in the SME Hotel Sector in Austria
The fact that information and communication technology (ICT) has a significant impact on industries and single organizations is an already established and well researched issue. Ma...
Markus Gratzer, Werner Winiwarter
WEBNET
1997
13 years 9 months ago
Telemedicine: An Inquiry in the Economic and Social Dynamics of Communications Technologies in the Medical Field
The health care industry in the United States has been experiencing substantial and ever increasing cost pressures. At the same time, many forces are revolutionizing the way healt...
Francis Pereira, Elizabeth Fife, Antonio A. Schuh
ICFP
2009
ACM
14 years 8 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
IEEEARES
2010
IEEE
14 years 3 days ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser