Sciweavers

617 search results - page 77 / 124
» Debugging distributed programs using controlled re-execution
Sort
View
125
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
98
Voted
JDS
2006
44views more  JDS 2006»
15 years 2 months ago
Multiagent Matching Algorithms with and without Coach
The concept of "agent" has been used to describe many different artefacts: software programs, mobile robots, or even human beings. In a system consisting of many agents, ...
Frieder Stolzenburg, Jan Murray, Karsten Sturm
CCGRID
2003
IEEE
15 years 7 months ago
Programming for Dependability in a Service-based Grid
Service-based Grid infrastructures emphasize service composition rather than sharing of low level resources. The idea is to build Grid applications out of computational services p...
Win Bausch, Cesare Pautasso, Gustavo Alonso
97
Voted
ICS
1995
Tsinghua U.
15 years 5 months ago
Gated SSA-based Demand-Driven Symbolic Analysis for Parallelizing Compilers
In this paper, we present a GSA-based technique that performs more e cient and more precise symbolic analysis of predicated assignments, recurrences and index arrays. The e ciency...
Peng Tu, David A. Padua
ACSC
2006
IEEE
15 years 8 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson