Sciweavers

109 search results - page 21 / 22
» Applying Layering Concept to the Software Requirements Analy...
Sort
View
DIMVA
2009
13 years 7 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
GROUP
2005
ACM
13 years 11 months ago
An optimization approach to group coupling in heterogeneous collaborative systems
Recent proliferation of computing devices has brought attention to heterogeneous collaborative systems, where key challenges arise from the resource limitations and disparities. S...
Carlos D. Correa, Ivan Marsic
BMCBI
2008
226views more  BMCBI 2008»
13 years 6 months ago
ProteoLens: a visual analytic tool for multi-scale database-driven biological network data mining
Background: New systems biology studies require researchers to understand how interplay among myriads of biomolecular entities is orchestrated in order to achieve high-level cellu...
Tianxiao Huan, Andrey Y. Sivachenko, Scott H. Harr...
IEEEPACT
2006
IEEE
14 years 7 days ago
Testing implementations of transactional memory
Transactional memory is an attractive design concept for scalable multiprocessors because it offers efficient lock-free synchronization and greatly simplifies parallel software....
Chaiyasit Manovit, Sudheendra Hangal, Hassan Chafi...
CGO
2006
IEEE
14 years 8 days ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...