Sciweavers

2957 search results - page 492 / 592
» Code analysis and CS-XML
Sort
View
HICSS
2009
IEEE
109views Biometrics» more  HICSS 2009»
15 years 11 months ago
The Construction of Peers and Artifacts: The Organizing Role of "Programming Guidelines"
In this paper, we1 study new organizational forms for production processes that emerge in large scale Free/Libre Open Source Software (FLOSS) projects. We will focus on the textua...
Vincenzo D'Andrea, Stefano De Paoli, Maurizio Teli
PDP
2009
IEEE
15 years 11 months ago
PsycoTrace: Virtual and Transparent Monitoring of a Process Self
PsycoTrace is a set of tools to protect a process P from attacks that alter P self as specified by its source code. P self is specified in terms of legal traces of system calls ...
Fabrizio Baiardi, Dario Maggiari, Daniele Sgandurr...
SC
2009
ACM
15 years 11 months ago
Scalable work stealing
Irregular and dynamic parallel applications pose significant challenges to achieving scalable performance on large-scale multicore clusters. These applications often require ongo...
James Dinan, D. Brian Larkins, P. Sadayappan, Srir...
CCS
2009
ACM
15 years 11 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea
ECOOP
2009
Springer
15 years 11 months ago
Program Metamorphosis
Modern development environments support refactoring by providing atomically behaviour-preserving transformations. While useful, these transformations are limited in three ways: (i)...
Christoph Reichenbach, Devin Coughlin, Amer Diwan