Sciweavers

2299 search results - page 423 / 460
» Design and Use of Industrial Software Architectures
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 1 months ago
Turning Cluster Management into Data Management: A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
102
Voted
CLUSTER
2007
IEEE
15 years 1 months ago
Meta-communications in component-based communication frameworks for grids
— Applications are faced with several network-related problems on current grids: heterogeneous networks, firewalls, NAT, private IP addresses, non-routed networks, performance p...
Alexandre Denis
JUCS
2010
89views more  JUCS 2010»
15 years 8 hour ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 1 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 8 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...