Sciweavers

331 search results - page 57 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
VIP
2001
13 years 8 months ago
Layered Earth Inversion Visual Toolkit: A Scientific Visualisation Case Study
Visualisation Systems are in general designed to maximise the cognitive ability of system users particularly when exposed to large sets of otherwise difficult to comprehend data, ...
Andrew Donohoo, Debbie Richards
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
KBSE
2003
IEEE
14 years 20 days ago
What Test Oracle Should I Use for Effective GUI Testing?
Test designers widely believe that the overall effectiveness and cost of software testing depends largely on the type and number of test cases executed on the software. In this pa...
Atif M. Memon, Ishan Banerjee, Adithya Nagarajan
DAC
2003
ACM
14 years 8 months ago
Scalable modeling and optimization of mode transitions based on decoupled power management architecture
To save energy, many power management policies rely on issuing mode-change commands to the components of the system. Efforts to date have focused on how these policies interact wi...
Dexin Li, Qiang Xie, Pai H. Chou
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi