Sciweavers

757 search results - page 111 / 152
» Composing Security-Aware Software
Sort
View
EUROSEC
2009
ACM
15 years 4 months ago
WISDOM: security-aware fibres
The network is becoming faster day by day. High-speed links, of many Gbps, are considered as commodity technology empowering the Internet. On the other hand, Moore’s law still a...
Elias Athanasopoulos, Antonis Krithinakis, Georgio...
ICONS
2009
IEEE
15 years 4 months ago
Modeling System Safety Requirements Using Input/Output Constraint Meta-automata
Most recent software related accidents have been system accidents. To validate the absence of system hazards concerning dysfunctional interactions, industrials call for approaches...
Zhe Chen, Gilles Motet
IROS
2009
IEEE
142views Robotics» more  IROS 2009»
15 years 4 months ago
Haptic feedback for molecular simulation
— In this paper, a new tool dedicated to the analysis and the conception of molecules is presented. It is composed of an adaptive simulation software and a haptic device used to ...
Aude Bolopion, Barthelemy Cagneau, Stephane Redon,...
ESAW
2009
Springer
15 years 4 months ago
A Space-Based Generic Pattern for Self-Initiative Load Balancing Agents
Abstract. Load-Balancing is a significant problem in heterogeneous distributed systems. There exist many load balancing algorithms, however, most approaches are very problem speci...
eva Kühn, Vesna Sesum-Cavic
ICCS
2009
Springer
15 years 4 months ago
A Holistic Approach for Performance Measurement and Analysis for Petascale Applications
Abstract. Contemporary high-end Terascale and Petascale systems are composed of hundreds of thousands of commodity multi-core processors interconnected with high-speed custom netwo...
Heike Jagode, Jack Dongarra, Sadaf R. Alam, Jeffre...