Sciweavers

4850 search results - page 804 / 970
» Approximate Data Structures with Applications
Sort
View
82
Voted
SRDS
2003
IEEE
15 years 3 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
77
Voted
SAC
2003
ACM
15 years 3 months ago
Organizational Modeling in UML and XML in the Context of Workflow Systems
Workflow technology plays a key role as an enabler in E-Commerce applications, such as supply chains. Until recently the major share of the attention of workflow systems researche...
Wil M. P. van der Aalst, Akhil Kumar, H. M. W. (Er...
ICSE
2010
IEEE-ACM
15 years 3 months ago
Codebook: discovering and exploiting relationships in software repositories
Large-scale software engineering requires communication and collaboration to successfully build and ship products. We conducted a survey with Microsoft engineers on inter-team coo...
Andrew Begel, Yit Phang Khoo, Thomas Zimmermann
96
Voted
ADBIS
2001
Springer
108views Database» more  ADBIS 2001»
15 years 2 months ago
An RMM-Based Methodology for Hypermedia Presentation Design
Due to the rapid growth of the Web, there is an increasing need for methodologies that support the design of Web-based Information Systems (WIS). After investigating the applicatio...
Flavius Frasincar, Geert-Jan Houben, Richard Vdovj...
77
Voted
JAVA
2001
Springer
15 years 2 months ago
Object-based collective communication in Java
CCJ is a communication library that adds MPI-like collective operations to Java. Rather than trying to adhere to the precise MPI syntax, CCJ aims at a clean integration of collect...
Arnold Nelisse, Thilo Kielmann, Henri E. Bal, Jaso...