Sciweavers

3181 search results - page 549 / 637
» Automated Deployment Support for Parallel Distributed Comput...
Sort
View
101
Voted
NSPW
2004
ACM
15 years 8 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
109
Voted
EDOC
2003
IEEE
15 years 8 months ago
MQL: a Powerful Extension to OCL for MOF Queries
The Meta-Object Facility (MOF) provides a standardised framework for object-oriented models. An instance of a MOF model contains objects and links whose interfaces are entirely de...
David Hearnden, Kerry Raymond, Jim Steel
133
Voted
ISORC
2009
IEEE
15 years 9 months ago
Property Preservation and Composition with Guarantees: From ASSERT to CHESS
While the demand for high-integrity applications continues to rise, industrial developers seek cost effective development strategies that are capable of delivering the required gu...
Tullio Vardanega
129
Voted
ASAP
2005
IEEE
133views Hardware» more  ASAP 2005»
15 years 8 months ago
Speedups from Partitioning Critical Software Parts to Coarse-Grain Reconfigurable Hardware
In this paper, we propose a hardware/software partitioning method for improving applications’ performance in embedded systems. Critical software parts are accelerated on hardwar...
Michalis D. Galanis, Grigoris Dimitroulakos, Costa...
91
Voted
MIDDLEWARE
2004
Springer
15 years 8 months ago
Data pipelines: enabling large scale multi-protocol data transfers
Collaborating users need to move terabytes of data among their sites, often involving multiple protocols. This process is very fragile and involves considerable human involvement ...
Tevfik Kosar, George Kola, Miron Livny