Sciweavers

CACM
2010
70views more  CACM 2010»
13 years 5 months ago
Securing elasticity in the cloud
Dustin Owens
CACM
2010
120views more  CACM 2010»
13 years 5 months ago
seL4: formal verification of an operating-system kernel
We report on the formal, machine-checked verification of microkernel from an abstract specification down to its C implementation. We assume correctness of compiler, assembly code,...
Gerwin Klein, June Andronick, Kevin Elphinstone, G...
CACM
2010
59views more  CACM 2010»
13 years 5 months ago
Institutional review boards and your research
Simson L. Garfinkel, Lorrie Faith Cranor
CACM
2010
141views more  CACM 2010»
13 years 5 months ago
The requisite variety of skills for IT professionals
Kevin P. Gallagher, Kate M. Kaiser, Judith C. Simo...
CACM
2010
105views more  CACM 2010»
13 years 5 months ago
Automatic program repair with evolutionary computation
Therearemanymethodsfordetectingandmitigatingsoftware errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work ...
Westley Weimer, Stephanie Forrest, Claire Le Goues...
CACM
2010
95views more  CACM 2010»
13 years 5 months ago
Cloud computing and electricity: beyond the utility model
Erik Brynjolfsson, Paul Hofmann, John Jordan
CACM
2010
117views more  CACM 2010»
13 years 5 months ago
Computing arbitrary functions of encrypted data
Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a "fully homomorph...
Craig Gentry
CACM
2010
65views more  CACM 2010»
13 years 5 months ago
WWW recycling for a better world
Stefano Ferretti, Marco Furini, Claudio E. Palazzi...
CACM
2010
73views more  CACM 2010»
13 years 5 months ago
A view of cloud computing
Michael Armbrust, Armando Fox, Rean Griffith, Anth...
CACM
2010
79views more  CACM 2010»
13 years 5 months ago
Why an informatics degree?
Dennis P. Groth, Jeffrey K. MacKie-Mason