Sciweavers

757 search results - page 62 / 152
» Composing Security-Aware Software
Sort
View
AC
2003
Springer
15 years 8 months ago
Replication Strategies for Highly Available Peer-to-Peer Storage
We are investigating strategies for using replication to design and implement highly reliable peer-to-peer systems. In particular, we are comparing the use of whole object and blo...
Ranjita Bhagwan, David Moore, Stefan Savage, Geoff...
97
Voted
EUROPAR
2001
Springer
15 years 7 months ago
A Component Framework for HPC Applications
Abstract. We describe a general component software framework designed for demanding grid environments that provides optimal performance for the assembled component application. Thi...
Nathalie Furmento, Anthony Mayer, Stephen McGough,...
WOSP
2000
ACM
15 years 7 months ago
Analytic modeling of load balancing policies for tasks with heavy-tailed distributions
We present an analytic technique for modeling load balancing policies on a cluster of servers conditioned on the fact that the service times of arriving tasks are drawn from heavy...
Alma Riska, Evgenia Smirni, Gianfranco Ciardo
UIST
1999
ACM
15 years 7 months ago
Nested User Interface Components
Nested User Interface Components combine the concepts of Zooming User Interfaces (ZUIs) with recursive nesting of active graphical user interface widgets. The resulting system of ...
Ken Perlin, Jon Meyer
EUROMICRO
1998
IEEE
15 years 7 months ago
Design Correctness of Digital Systems
Transformational design is aformal technique directed at design correctness. It integrates design and veriJication by the use of pre-proven behaviour preserving transformations as...
Corrie Huijs