Sciweavers

529 search results - page 43 / 106
» Dynamic Deployment of Executing and Simulating Software Comp...
Sort
View
CSMR
1998
IEEE
15 years 2 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
DSN
2007
IEEE
15 years 4 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer
FASE
2008
Springer
14 years 11 months ago
Translating Model Simulators to Analysis Models
We present a novel approach for the automatic generation of model-to-model transformations given a description of the operational semantics of the source language by means of graph...
Juan de Lara, Hans Vangheluwe
SIGMETRICS
2003
ACM
129views Hardware» more  SIGMETRICS 2003»
15 years 2 months ago
Run-time modeling and estimation of operating system power consumption
The increasing constraints on power consumption in many computing systems point to the need for power modeling and estimation for all components of a system. The Operating System ...
Tao Li, Lizy Kurian John
EWSPT
2000
Springer
15 years 1 months ago
Advanced Services for Process Evolution: Monitoring and Decision Support
Process support environments (PSEs) are widely used for modelling, enacting and analyzing human intensive processes. The benefits of a PSE become apparent when processes to be supp...
Ilham Alloui, Sami Beydeda, Sorana Cîmpan, V...