Sciweavers

361 search results - page 58 / 73
» Effecting change: coordination in large-scale software devel...
Sort
View
100
Voted
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
15 years 1 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
86
Voted
SIGSOFT
2007
ACM
16 years 11 days ago
Programming asynchronous layers with CLARITY
Asynchronous systems components are hard to write, hard to reason about, and (not coincidentally) hard to mechanically verify. In order to achieve high performance, asynchronous c...
Prakash Chandrasekaran, Christopher L. Conway, Jos...
IWPC
2008
IEEE
15 years 6 months ago
Reusing Program Investigation Knowledge for Code Understanding
Software maintenance tasks typically involve an important amount of program investigation effort on the part of software developers. To what extent can we benefit from prior prog...
Martin P. Robillard, Putra Manggala
103
Voted
ICDCS
2002
IEEE
15 years 4 months ago
Process Migration: A Generalized Approach Using a Virtualizing Operating System
Process migration has been used to perform specialized tasks, such as load sharing and checkpoint/restarting long running applications. Implementation typically consists of modifi...
Tom Boyd, Partha Dasgupta
FCCM
2008
IEEE
205views VLSI» more  FCCM 2008»
15 years 6 months ago
Credit Risk Modelling using Hardware Accelerated Monte-Carlo Simulation
The recent turmoil in global credit markets has demonstrated the need for advanced modelling of credit risk, which can take into account the effects of changing economic condition...
David B. Thomas, Wayne Luk