Sciweavers

1663 search results - page 253 / 333
» Software Reuse and Safety
Sort
View
CORR
2004
Springer
129views Education» more  CORR 2004»
13 years 8 months ago
Runtime Reconfiguration of J2EE Applications
: Runtime reconfiguration considered as "applying required changes to a running system" plays an important role for providing high availability not only of safety- and mi...
Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm H...
CONCURRENCY
1998
130views more  CONCURRENCY 1998»
13 years 8 months ago
JPVM: network parallel computing in Java
The JPVM library is a software system for explicit message-passing based distributed memory MIMD parallel programming in Java. The library supports an interface similar to the C a...
Adam Ferrari
STTT
2010
120views more  STTT 2010»
13 years 3 months ago
Solving the ignoring problem for partial order reduction
Abstract. Partial order reduction limits the state explosion problem that arises in model checking by limiting the exploration of redundant interleavings. A state space search algo...
Sami Evangelista, Christophe Pajault
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
13 years 18 days ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
ASPLOS
2011
ACM
13 years 15 days ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...