Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
This paper discusses the design, development, and use of a performance monitoring tool for Distributed Interactive Simulations (DIS). A typical DIS environment consists of hundred...
Mb describe the design and implementation of a constraint management facility for our active object-oriented database system called Jasmine/A. The facility includes integrity cons...
Immortal DB is a transaction time database system designed to enable high performance for temporal applications. It is built into a commercial database engine, Microsoft SQL Serve...
David B. Lomet, Mingsheng Hong, Rimma V. Nehme, Ru...
This paper presents a process modeling language known as the GridPML for the composition of Grid Services. The GridPML is an XML-based language that supports basic control flow co...
Hua Ma, Susan Darling Urban, Yang Xiao, Suzanne W....