Sciweavers

117 search results - page 12 / 24
» C to Java Migration Experiences
Sort
View
70
Voted
DATE
2010
IEEE
204views Hardware» more  DATE 2010»
15 years 2 months ago
Assertion-based verification of RTOS properties
— Today, mobile and embedded real time systems have to cope with the migration and allocation of multiple software tasks running on top of a real time operating system (RTOS) res...
Marcio F. S. Oliveira, Henning Zabel, Wolfgang M&u...
77
Voted
USS
2008
14 years 12 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
MOBICOM
2004
ACM
15 years 2 months ago
MobiDesk: mobile virtual desktop computing
We present MobiDesk, a mobile virtual desktop computing hosting infrastructure that leverages continued improvements in network speed, cost, and ubiquity to address the complexity...
Ricardo A. Baratto, Shaya Potter, Gong Su, Jason N...
INFOCOM
2012
IEEE
12 years 12 months ago
Scaling social media applications into geo-distributed clouds
—Federation of geo-distributed cloud services is a trend in cloud computing which, by spanning multiple data centers at different geographical locations, can provide a cloud plat...
Yu Wu, Chuan Wu, Bo Li 0001, Linquan Zhang, Zongpe...
89
Voted
IJHPCA
2006
80views more  IJHPCA 2006»
14 years 9 months ago
Interference-Aware Scheduling
Overlapping communication with computation is a well-known technique to increase application performance. While it is commonly assumed that communication and computation can be ov...
Barbara Kreaseck, Larry Carter, Henri Casanova, Je...