Sciweavers

662 search results - page 79 / 133
» Using software evolution to focus architectural recovery
Sort
View
SBACPAD
2005
IEEE
111views Hardware» more  SBACPAD 2005»
14 years 2 months ago
VRM: A Failure-Aware Grid Resource Management System
Abstract— For resource management in Grid environments, advance reservations turned out to be very useful and hence are supported by a variety of Grid toolkits. However, failure ...
Lars-Olof Burchard, César A. F. De Rose, Ha...
ICWSM
2009
13 years 6 months ago
Gephi: An Open Source Software for Exploring and Manipulating Networks
Gephi is an open source software for graph and network analysis. It uses a 3D render engine to display large networks in real-time and to speed up the exploration. A flexible and ...
Mathieu Bastian, Sebastien Heymann, Mathieu Jacomy
ACSAC
2003
IEEE
14 years 11 days ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
JECR
2000
167views more  JECR 2000»
13 years 8 months ago
Commercial Scenarios of Digital Agent Deployment: A Functional Classification
The evolution and commercialization of Web Information Systems (WIS) since 1991 has gradually shifted the focus from basic design issues to feedback analysis, visualization techni...
Arno Scharl, Christian Bauer, Marion Kaukal
CCS
2009
ACM
14 years 3 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...