Sciweavers

4820 search results - page 402 / 964
» Implementing Signatures for C
Sort
View
DSN
2004
IEEE
15 years 8 months ago
Efficient Hierarchic Management For Reconfiguration of Networked Information Systems
The management of modern distributed systems is complicated by scale and dynamics. Scalable, decoupled communication establishes flexible, loosely coupled component relationships,...
Jonathan C. Rowanhill, Philip E. Varner, John C. K...
ECOOP
2004
Springer
15 years 8 months ago
Early Identification of Incompatibilities in Multi-component Upgrades
Previous work proposed a technique for predicting problems resulting from replacing one version of a software component by another. The technique reports, before performing the rep...
Stephen McCamant, Michael D. Ernst
DSOM
2006
Springer
15 years 8 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
SC
2000
ACM
15 years 8 months ago
High Performance Reactive Fluid Flow Simulations Using Adaptive Mesh Refinement on Thousands of Processors
We present simulations and performance results of nuclear burning fronts in supernovae on the largest domain and at the finest spatial resolution studied to date. These simulation...
A. C. Calder, Bruce C. Curtis, L. J. Dursi, Bruce ...
INFOCOM
1995
IEEE
15 years 8 months ago
A Service with Bounded Degradation in Quality-of-Service Networks
Many network applications that require Quality-ofService QoS support, such as transmission of digital voice and video, tolerate a certain level of service degradation. In this s...
Jörg Liebeherr, Dongwei Liao