Sciweavers

1906 search results - page 228 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
IEEEARES
2010
IEEE
15 years 11 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
ECBS
1996
IEEE
93views Hardware» more  ECBS 1996»
15 years 8 months ago
A Methodology for Designing and Dimensioning Critical Complex Computing Systems
It is widely recognized that real-time,fault-tolerant and distributed computing technologies play a key role in the deployment of many current andfuture (civilian or Defense) crit...
Gérard Le Lann
CEC
2007
IEEE
15 years 10 months ago
Graph design by graph grammar evolution
— Determining the optimal topology of a graph is pertinent to many domains, as graphs can be used to model a variety of systems. Evolutionary algorithms constitute a popular opti...
Martin H. Luerssen, David M. W. Powers
CORR
2004
Springer
87views Education» more  CORR 2004»
15 years 4 months ago
Roles Are Really Great!
We present a new role system for specifying changing referencing relationships of heap objects. The role of an object depends, in large part, on its aliasing relationships with ot...
Viktor Kuncak, Patrick Lam, Martin C. Rinard
ICITS
2009
15 years 2 months ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs