Sciweavers

3516 search results - page 543 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
15 years 9 months ago
Indexing multi-dimensional data in a cloud system
Providing scalable database services is an essential requirement for extending many existing applications of the Cloud platform. Due to the diversity of applications, database ser...
Jinbao Wang, Sai Wu, Hong Gao, Jianzhong Li, Beng ...
CC
2003
Springer
102views System Software» more  CC 2003»
15 years 9 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
IEEEARES
2006
IEEE
15 years 10 months ago
No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies
Efforts have been put for electronization of complementary currencies (alternative forms of monetary media) in the hope that it would reduce their operational cost. However, this ...
Kenji Saito, Eiichi Morino, Jun Murai
WORDS
2005
IEEE
15 years 9 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...
126
Voted
BPM
2004
Springer
113views Business» more  BPM 2004»
15 years 9 months ago
OPCATeam - Collaborative Business Process Modeling with OPM
While collaboration has become a basic requirement for many development environments, solutions for collaborative modeling are far from being satisfact1ory. OPCATeam, which relies ...
Dov Dori, Dizza Beimel, Eran Toch