Sciweavers

3667 search results - page 275 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
CLOUDCOM
2010
Springer
15 years 2 months ago
A Study in Hadoop Streaming with Matlab for NMR Data Processing
Applying Cloud computing techniques for analyzing large data sets has shown promise in many data-driven scientific applications. Our approach presented here is to use Cloud comput...
Kalpa Gunaratna, Paul Anderson, Ajith Ranabahu, Am...
COMPSAC
2009
IEEE
15 years 11 months ago
SN2K Attacks and Honest Services
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
Ashish Kundu
COMPSAC
2009
IEEE
15 years 11 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
AOSE
2007
Springer
15 years 11 months ago
Tool-Supported Development with Tropos: The Conference Management System Case Study
Abstract. The agent-oriented software engineering methodology Tropos offers a structured development process and supporting tools for developing complex, distributed systems. The ...
Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alber...
ICSM
2006
IEEE
15 years 10 months ago
Properties of Signature Change Patterns
Understanding function signature change properties and evolution patterns is important for researchers concerned with alleviating signature change impacts, understanding software ...
Sunghun Kim, E. James Whitehead Jr.