Sciweavers

318 search results - page 33 / 64
» Software Reliability as a Function of User Execution Pattern...
Sort
View
ICWS
2008
IEEE
13 years 9 months ago
QoS-Driven Selection of Web Services for Transactional Composition
Web services composition has been gaining interest over the last years as it leverages the capabilities to offer complex operations resulting from the aggregation of Web services ...
Joyce El Haddad, Maude Manouvrier, Guillermo Ramir...
BMCBI
2008
148views more  BMCBI 2008»
13 years 7 months ago
Automating dChip: toward reproducible sharing of microarray data analysis
Background: During the past decade, many software packages have been developed for analysis and visualization of various types of microarrays. We have developed and maintained the...
Cheng Li
CCS
2007
ACM
14 years 1 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
ASPLOS
2010
ACM
14 years 2 months ago
SherLog: error diagnosis by connecting clues from run-time logs
Computer systems often fail due to many factors such as software bugs or administrator errors. Diagnosing such production run failures is an important but challenging task since i...
Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuan...