Sciweavers

852 search results - page 96 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
ESSOS
2009
Springer
15 years 9 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
SIGOPSE
2000
ACM
15 years 8 months ago
Multiprocessing and portability for PDAs
The role of small devices in the emerging all-connected computer infrastructure is growing. So are the requirements that the application execution environments face. Portability, ...
Grzegorz Czajkowski
VLDB
1999
ACM
113views Database» more  VLDB 1999»
15 years 8 months ago
Hyper-Programming in Java
Hyper-programming is a technology only available in persistent systems, since hyper-program source code contains both text and links to persistent objects. A hyper-programming sys...
Evangelos Zirintsis, Graham N. C. Kirby, Ronald Mo...
POS
1998
Springer
15 years 8 months ago
Porting a Distributed System to PJama: Orthogonal Persistence for Java?
This paper describes the experience of porting a 25,000 line distributed Java [GJS97] program to version 0.3.5.1 of the orthogonally persistent programming environment PJama. The ...
Huw Evans, Susan Spence
CPHYSICS
2007
51views more  CPHYSICS 2007»
15 years 4 months ago
Shearingbox-implementation for the central-upwind, constraint-transport MHD-code NIRVANA
We describe the implementation of the shearingbox approach into the Godunovtype central-upwind/constraint-transport magnetohydrodynamics code NIRVANA. This will allow for applicat...
O. Gressel, U. Ziegler