Sciweavers

2826 search results - page 161 / 566
» A resource-based analysis of IT sourcing
Sort
View
SIGSOFT
2010
ACM
14 years 11 months ago
Validity concerns in software engineering research
Empirical studies that use software repository artifacts have become popular in the last decade due to the ready availability of open source project archives. In this paper, we su...
Hyrum K. Wright, Miryung Kim, Dewayne E. Perry
ICDIM
2007
IEEE
15 years 8 months ago
Minimality quality criterion evaluation for integrated schemas
: Integrated access to distributed data is an important problem faced in scientific and commercial applications. A data integration system provides a unified view for users to subm...
Maria da Conceição Moraes Batista, A...
109
Voted
PASTE
2010
ACM
15 years 7 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
RTSS
1998
IEEE
15 years 6 months ago
Statistical Delay Guarantee of Virtual Clock
In this paper, we derive a statistical delay guarantee of the generalized Virtual Clock scheduling algorithm. We define the concept of an equivalent fluid and packet source and pr...
Pawan Goyal, Harrick M. Vin
134
Voted
ESORICS
2012
Springer
13 years 4 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...