In this paper, we investigate the practical performance of lock-free techniques that provide synchronization on shared-memory multiprocessors. Our goal is to provide a technique t...
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating the proofs which are inherently larg...
The work presented in this paper targets the software integration on the level of business process models. The goal is to create the behavioural description of an integrated syste...
Georg Grossmann, Michael Schrefl, Markus Stumptner
: In today's companies, particularly multi-national enterprises acting on a global scale, historically grown systems and application landscapes, as well as processes, lead to ...