Sciweavers

40 search results - page 7 / 8
» Active Rules for Runtime Adaptivity Management
Sort
View
SADFE
2008
IEEE
14 years 18 days ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
GPCE
2009
Springer
13 years 9 months ago
Mapping problem-space to solution-space features: a feature interaction approach
Mapping problem-space features into solution-space features is a fundamental configuration problem in software product line engineering. A configuration problem is defined as g...
Frans Sanen, Eddy Truyen, Wouter Joosen
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 6 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
ITSSA
2006
182views more  ITSSA 2006»
13 years 6 months ago
Application of Business Process Execution Language to Scientific Workflows
: This paper investigates the use of the Business Process Execution Language for Web services (BPEL4WS/ BPEL) for managing scientific workflows. The complexity, unpredictability an...
Asif Akram, David Meredith, Rob Allan
MOBICOM
2004
ACM
13 years 11 months ago
Using code collection to support large applications on mobile devices
The progress of mobile device technology unfolds a new spectrum of applications that challenges conventional infrastructure models. Most of these devices are perceived by their us...
Lucian Popa 0002, Irina Athanasiu, Costin Raiciu, ...