Sciweavers

810 search results - page 112 / 162
» A Tool for Enterprise Architecture Analysis
Sort
View
HPCA
2005
IEEE
15 years 10 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ACSAC
2002
IEEE
15 years 2 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
WSC
1997
14 years 11 months ago
A Performance Monitoring Application for Distributed Interactive Simulations (DIS)
This paper discusses the design, development, and use of a performance monitoring tool for Distributed Interactive Simulations (DIS). A typical DIS environment consists of hundred...
David B. Cavitt, C. Michael Overstreet, Kurt Maly
BIOCOMP
2006
14 years 11 months ago
Bioinformatics Web Services
- Web services is distributed computing technology that provides software services over the Web. The Cyberinfrastructure Group at the Virginia Bioinformatics Institute (VBI) has ad...
Boyu Yang, Tian Xue, Jing Zhao, Chaitanya Kommidi,...
STTT
2010
122views more  STTT 2010»
14 years 8 months ago
Rodin: an open toolset for modelling and reasoning in Event-B
Event-B is a formal method for system-level modelling and analysis. Key features of Event-B are the use of set theory as a modelling notation, the use of ent to represent systems a...
Jean-Raymond Abrial, Michael J. Butler, Stefan Hal...