Sciweavers

8109 search results - page 1278 / 1622
» A Model of Component-Based Programming
Sort
View
CLOUDCOM
2010
Springer
15 years 3 months ago
Applying Twister to Scientific Applications
Many scientific applications suffer from the lack of a unified approach to support the management and efficient processing of large-scale data. The Twister MapReduce Framework, whi...
Bingjing Zhang, Yang Ruan, Tak-Lon Wu, Judy Qiu, A...
LPAR
2010
Springer
15 years 2 months ago
Interpolating Quantifier-Free Presburger Arithmetic
Craig interpolation has become a key ingredient in many symbolic model checkers, serving as an approximative replacement for expensive quantifier elimination. In this paper, we foc...
Daniel Kroening, Jérôme Leroux, Phili...
UTP
2010
15 years 2 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
ERSA
2009
109views Hardware» more  ERSA 2009»
15 years 2 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
ICSOC
2009
Springer
15 years 2 months ago
Lightweight Composition of Ad-Hoc Enterprise-Class Applications with Context-Aware Enterprise Mashups
The huge demand for ad-hoc and situational enterprise-class applications led to a new kind of Web-based applications, known as enterprise mashups. End users from the business units...
Florian Gilles, Volker Hoyer, Till Janner, Katarin...
« Prev « First page 1278 / 1622 Last » Next »