Sciweavers

201 search results - page 15 / 41
» Design and implementation of a secure wide-area object middl...
Sort
View
75
Voted
COOPIS
2004
IEEE
15 years 1 months ago
Security Management Through Overloading Views
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...
Radoslaw Adamus, Kazimierz Subieta
IPPS
1998
IEEE
15 years 1 months ago
Design and Implementation of the FRIENDS System
The paper describes a metaobject architecture for distributed fault tolerant systems. Basically metaobject protocols enables functional objects to be independent from meta-function...
Jean-Charles Fabre
84
Voted
EUROPAR
2005
Springer
15 years 3 months ago
MADIS: A Slim Middleware for Database Replication
Availability and performance can be improved using data replication as the basic technique, thus benefitting the services provided by a distributed system. However, replication im...
Luis Irún-Briz, Hendrik Decker, Rubé...
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
OOPSLA
2007
Springer
15 years 3 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden