Sciweavers

917 search results - page 163 / 184
» Structural Testing of Component-Based Systems
Sort
View
PLDI
2005
ACM
14 years 2 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
PAM
2004
Springer
14 years 2 months ago
Measurements and Laboratory Simulations of the Upper DNS Hierarchy
Given that the global DNS system, especially at the higher root and top-levels, experiences significant query loads, we seek to answer the following questions: (1) How does the ch...
Duane Wessels, Marina Fomenkov, Nevil Brownlee, Ki...
BTW
2003
Springer
103views Database» more  BTW 2003»
14 years 2 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert
ESOP
2001
Springer
14 years 1 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
BMCBI
2010
139views more  BMCBI 2010»
13 years 8 months ago
PoGO: Prediction of Gene Ontology terms for fungal proteins
Background: Automated protein function prediction methods are the only practical approach for assigning functions to genes obtained from model organisms. Many of the previously re...
Jaehee Jung, Gangman Yi, Serenella A. Sukno, Micha...