Sciweavers

2575 search results - page 515 / 515
» Providing security with insecure systems
Sort
View
EAGC
2003
Springer
13 years 10 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
ECBS
2000
IEEE
87views Hardware» more  ECBS 2000»
13 years 9 months ago
Limited Software Warranties
Because there are di erent types of software (e.g., language, application, target environment, etc.), di erent software certi cation methodologies are needed. Software process imp...
Jeffrey M. Voas
SIGCSE
2002
ACM
134views Education» more  SIGCSE 2002»
13 years 4 months ago
Internationalization of the curriculum report of a project within computer science
In the Fall of 1999 the Center for Excellence in Undergraduate Teaching (CEUT) and the International Office at Virginia Tech provided a small grant to support the incorporation of...
John A. N. Lee
VSTTE
2010
Springer
13 years 2 months ago
Towards Scalable Modular Checking of User-Defined Properties
Abstract. Theorem-prover based modular checkers have the potential to perform scalable and precise checking of user-defined properties by combining pathsensitive intraprocedural re...
Thomas Ball, Brian Hackett, Shuvendu K. Lahiri, Sh...
IMC
2006
ACM
13 years 11 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan