Sciweavers

124 search results - page 24 / 25
» Metadata Update Performance in File Systems
Sort
View
ACSC
2004
IEEE
13 years 9 months ago
Java Implementation Verification Using Reverse Engineering
An approach to system verification is described in which design artefacts produced during forward engineering are automatically compared to corresponding artefacts produced during...
David J. A. Cooper, Benjamin Khoo, Brian R. von Ko...
CCS
2009
ACM
14 years 2 days ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...
BMCBI
2010
124views more  BMCBI 2010»
13 years 5 months ago
GPFrontend and GPGraphics: graphical analysis tools for genetic association studies
Background: Most software packages for whole genome association studies are non-graphical, purely text based programs originally designed to run with UNIX-like operating systems. ...
Steffen Uebe, Francesca Pasutto, Mandy Krumbiegel,...
ESEM
2010
ACM
13 years 3 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ICSE
2001
IEEE-ACM
13 years 9 months ago
A Web-Oriented Architectural Aspect for the Emerging Computational Tapestry
An emerging tapestry of computations will soon integrate systems around the globe. It will evolve without central control. Its complexity will be vast. We need new ideas, tools an...
Kevin J. Sullivan, Avneesh Saxena