Sciweavers

2400 search results - page 413 / 480
» Systems Failures
Sort
View
CCS
2008
ACM
13 years 11 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
CONEXT
2005
ACM
13 years 10 months ago
TIE breaking: tunable interdomain egress selection
— The separation of intradomain and interdomain routing has been a key feature of the Internet’s routing architecture from the early days of the ARPAnet. However, the appropria...
Renata Teixeira, Timothy G. Griffin, Mauricio G. C...
ESAW
2007
Springer
13 years 10 months ago
Progress Appraisal as a Challenging Element of Coordination in Human and Machine Joint Activity
Joint activity, as we define it, is a mutually interdependent social endeavor that requires sufficient predictability among participating parties to enable coordination. Coordinati...
Paul J. Feltovich, Jeffrey M. Bradshaw, William J....
ICWS
2010
IEEE
13 years 10 months ago
Towards Data-Aware QoS-driven Adaptation for Service Orchestrations
Several activities in service oriented computing can benefit from the knowledge of properties of a given service composition ahead of time. We will focus here on properties related...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
FECS
2008
129views Education» more  FECS 2008»
13 years 10 months ago
Assessment of Student Performance in an Internet-Based Multimedia Classroom
Much research has been devoted to the study of exclusively distance-learning paradigms for teaching various technological subjects, yet many students have not been satisfied with ...
Stephen Turner, Michael Farmer