Sciweavers

757 search results - page 114 / 152
» Composing Security-Aware Software
Sort
View
CC
2007
Springer
15 years 4 months ago
Correcting the Dynamic Call Graph Using Control-Flow Constraints
Abstract. To reason about programs, dynamic optimizers and analysis tools use sampling to collect a dynamic call graph (DCG). However, sampling has not achieved high accuracy with ...
Byeongcheol Lee, Kevin Resnick, Michael D. Bond, K...
ICSOC
2007
Springer
15 years 4 months ago
Negotiation of Service Level Agreements: An Architecture and a Search-Based Approach
Software systems built by composing existing services are more and more capturing the interest of researchers and practitioners. The envisaged long term scenario is that services, ...
Elisabetta Di Nitto, Massimiliano Di Penta, Alessi...
SOCO
2007
Springer
15 years 4 months ago
Debugging Aspect-Enabled Programs
Abstract. The ability to debug programs composed using aspect-oriented programming (AOP) techniques is critical to the adoption of AOP. Nevertheless, many AOP systems lack adequate...
Marc Eaddy, Alfred V. Aho, Weiping Hu, Paddy McDon...
COMSWARE
2006
IEEE
15 years 4 months ago
Middleware for wireless sensor networks: A survey
Given the fast growing technological progress in microelectronics and wireless communication devices, in the near future, it is foreseeable that Wireless Sensor Networks (WSN) wil...
Salem Hadim, Nader Mohamed
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 4 months ago
Improving the Response Time of Business Processes: An Alert-Based Analytical Approach
Large enterprises in application domains such as finance, banking, travel services, and hospital management use business processes for their day-to-day business. An integral part ...
Eleanna Kafeza, Dickson K. W. Chiu, Kamalakar Karl...