Sciweavers

8493 search results - page 1571 / 1699
» Implementing a distributed firewall
Sort
View
137
Voted
SIGSOFT
2009
ACM
15 years 10 months ago
Automatic synthesis of behavior protocols for composable web-services
Web-services are broadly considered as an effective means to achieve interoperability between heterogeneous parties of a business process and offer an open platform for developing...
Antonia Bertolino, Paola Inverardi, Patrizio Pelli...
127
Voted
VEE
2009
ACM
172views Virtualization» more  VEE 2009»
15 years 10 months ago
Entropy: a consolidation manager for clusters
Clusters provide powerful computing environments, but in practice much of this power goes to waste, due to the static allocation of tasks to nodes, regardless of their changing co...
Fabien Hermenier, Xavier Lorca, Jean-Marc Menaud, ...
154
Voted
ICS
2009
Tsinghua U.
15 years 10 months ago
High-performance regular expression scanning on the Cell/B.E. processor
Matching regular expressions (regexps) is a very common workload. For example, tokenization, which consists of recognizing words or keywords in a character stream, appears in ever...
Daniele Paolo Scarpazza, Gregory F. Russell
IPSN
2009
Springer
15 years 10 months ago
Recovering temporal integrity with Data Driven Time Synchronization
Data Driven Time Synchronization (DDTS) provides synchronization across sensors by using underlying characteristics of data collected by an embedded sensing system. We apply the c...
Martin Lukac, Paul Davis, Robert Clayton, Deborah ...
TACAS
2009
Springer
101views Algorithms» more  TACAS 2009»
15 years 10 months ago
Parametric Trace Slicing and Monitoring
Analysis of execution traces plays a fundamental role in many program analysis approaches. Execution traces are frequently parametric, i.e., they contain events with parameter bind...
Feng Chen, Grigore Rosu
« Prev « First page 1571 / 1699 Last » Next »