Sciweavers

306 search results - page 61 / 62
» Design Principles for B2B Services - An Evaluation of Two Al...
Sort
View
ATAL
2007
Springer
13 years 12 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...
MIDDLEWARE
2007
Springer
13 years 12 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
CGO
2006
IEEE
13 years 12 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
LCN
2006
IEEE
13 years 11 months ago
Computing Real Time Jobs in P2P Networks
— In this paper, we present a distributed computing framework designed to support higher quality of service and fault tolerance for processing deadline-driven tasks in a P2P envi...
Jingnan Yao, Jian Zhou, Laxmi N. Bhuyan
ECBS
2009
IEEE
193views Hardware» more  ECBS 2009»
13 years 3 months ago
CQML: Aspect-Oriented Modeling for Modularizing and Weaving QoS Concerns in Component-Based Systems
Current domain-specific modeling (DSM) frameworks for designing component-based systems often consider the system's structural and behavioral concerns as the two dominant con...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...