Sciweavers

TOMS
2010
89views more  TOMS 2010»
13 years 9 months ago
DOLFIN: Automated finite element computing
s the mathematical abstractions and methods used in the design of the library and its implementation. A number of examples are presented to demonstrate the use of the library in ap...
Anders Logg, Garth N. Wells
OSDI
1996
ACM
14 years 23 days ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...
IWUC
2004
14 years 25 days ago
Ubiquitous Application Development using a Mobile Agent-based System
Abstract. This study proposes a methodology that allows the flexible and maintainable development of application based on mobile agent to a ubiquitous environment. Ubiquitous envir...
Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Ho...
ACSAC
2001
IEEE
14 years 3 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin
ICDCS
1996
IEEE
14 years 3 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
CSMR
1998
IEEE
14 years 3 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
IPPS
2003
IEEE
14 years 4 months ago
Continuous Compilation: A New Approach to Aggressive and Adaptive Code Transformation
Over the past several decades, the compiler research community has developed a number of sophisticated and powerful algorithms for a varierty of code improvements. While there are...
Bruce R. Childers, Jack W. Davidson, Mary Lou Soff...
DATE
2003
IEEE
117views Hardware» more  DATE 2003»
14 years 4 months ago
Exploring SW Performance Using SoC Transaction-Level Modeling
This paper presents VISTA, a new methodology and tool dedicated to analyse system level performance by executing full-scale SW application code on a transaction-level model of the...
Imed Moussa, Thierry Grellier, Giang Nguyen
VLDB
2007
ACM
141views Database» more  VLDB 2007»
14 years 5 months ago
Bridging the Application and DBMS Profiling Divide for Database Application Developers
tools for profiling and tuning application code remain disconnected from the profiling and tuning tools for relational DBMSs. This makes it challenging for developers of database ...
Surajit Chaudhuri, Vivek R. Narasayya, Manoj Syama...
IEEEARES
2008
IEEE
14 years 5 months ago
Application-Oriented Trust in Distributed Computing
Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execut...
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, ...