Sciweavers

4307 search results - page 257 / 862
» Dynamic Spyware Analysis
Sort
View
PLDI
1998
ACM
15 years 5 months ago
Type-Based Alias Analysis
This paper evaluates three alias analyses based on programming language types. The first analysis uses type compatibility to determine aliases. The second extends the first by u...
Amer Diwan, Kathryn S. McKinley, J. Eliot B. Moss
101
Voted
GRID
2007
Springer
15 years 7 months ago
On the dynamic resource availability in grids
— Currently deployed grids gather together thousands of computational and storage resources for the benefit of a large community of scientists. However, the large scale, the wid...
Alexandru Iosup, Mathieu Jan, Omer Ozan Sonmez, Di...
75
Voted
CHI
2009
ACM
16 years 1 months ago
Understanding teamwork in high-risk domains through analysis of errors
Trauma care is an example of dynamic, complex, and safety-critical teamwork. The staff in trauma centers works under time pressure and lacks effective information technologies to ...
Aleksandra Sarcevic
97
Voted
TRUSTBUS
2009
Springer
15 years 7 months ago
Operational Semantics for DKAL: Application and Analysis
DKAL is a new expressive high-level authorization language. It has been successfully tried at Microsoft which led to further improvements of the language itself. One improvement is...
Yuri Gurevich, Arnab Roy
117
Voted
SASO
2007
IEEE
15 years 7 months ago
Adaptive SSL: Design, Implementation and Overhead Analysis
Adaptive security is based on the observation that the security requirements of a system or service heavily depend on the environment in which they operate and should therefore be...
Christiaan J. Lamprecht, Aad P. A. van Moorsel