Sciweavers

7080 search results - page 989 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
151
Voted
FAABS
2000
Springer
15 years 8 months ago
From Livingstone to SMV
To ful ll the needs of its deep space exploration program, NASAis actively supporting research and development in autonomy software. However, the reliable and cost-e ective develop...
Charles Pecheur, Reid G. Simmons
COMCOM
2000
125views more  COMCOM 2000»
15 years 4 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
SAC
2008
ACM
15 years 4 months ago
Workflow management versus case handling: results from a controlled software experiment
Business Process Management (BPM) technology has become an important instrument for improving process performance. When considering its use, however, enterprises typically have to...
Bela Mutschler, Barbara Weber, Manfred Reichert
MOBISYS
2009
ACM
16 years 5 months ago
Leveraging smart phones to reduce mobility footprints
Mobility footprint refers to the size, weight, and energy demand of the hardware that must be carried by a mobile user to be effective at any time and place. The ideal of a zero m...
Stephen Smaldone, Benjamin Gilbert, Nilton Bila, L...
OSDI
2002
ACM
16 years 5 months ago
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides ...
Atul Adya, William J. Bolosky, Miguel Castro, Gera...