Sciweavers

328 search results - page 49 / 66
» A case study in building layered DHT applications
Sort
View
MM
2004
ACM
116views Multimedia» more  MM 2004»
15 years 7 months ago
A taxonomy for multimedia service composition
The realization of multimedia systems still heavily relies on building monolithic systems that need to be reengineered for every change in the application and little of which can ...
Klara Nahrstedt, Wolf-Tilo Balke
119
Voted
ICSE
2007
IEEE-ACM
15 years 8 months ago
Data Flow-Based Validation of Web Services Compositions: Perspectives and Examples
Composition of Web Services (WSs) is anticipated as the future standard way to dynamically build distributed applications, and hence their verification and validation is attractin...
Cesare Bartolini, Antonia Bertolino, Eda Marchetti...
JOC
2011
104views more  JOC 2011»
14 years 4 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
ICSE
2008
IEEE-ACM
16 years 2 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
108
Voted
CBSE
2009
Springer
15 years 8 months ago
Selecting Fault Tolerant Styles for Third-Party Components with Model Checking Support
To build highly available or reliable applications out of unreliable third-party components, some software-implemented fault-tolerant mechanisms are introduced to gracefully deal w...
Junguo Li, Xiangping Chen, Gang Huang, Hong Mei, F...