Sciweavers

1704 search results - page 213 / 341
» Modeling virtualized applications using machine learning tec...
Sort
View
118
Voted
PLDI
2009
ACM
15 years 9 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
124
Voted
INCDM
2010
Springer
146views Data Mining» more  INCDM 2010»
15 years 6 months ago
Learning from Humanoid Cartoon Designs
Abstract. Character design is a key ingredient to the success of any comicbook, graphic novel, or animated feature. Artists typically use shape, size and proportion as the first de...
Md. Tanvirul Islam, Kaiser Md. Nahiduzzaman, Why Y...
133
Voted
WSC
1997
15 years 4 months ago
Arena Software Tutorial
The Arena modeling system from Systems Modeling Corporation is a flexible and powerful tool that allows analysts to create animated simulation models that accurately represent vir...
David A. Takus, David M. Profozich
215
Voted
SOCA
2010
IEEE
15 years 19 days ago
Virtualised e-Learning with real-time guarantees on the IRMOS platform
In this paper we focus on how Quality of Service guarantees are provided to virtualised applications in the Cloud Computing infrastructure that is being developed in the context of...
Tommaso Cucinotta, Fabio Checconi, Zlatko Zlatev, ...
117
Voted
ESEC
1999
Springer
15 years 7 months ago
FACADE: A Typed Intermediate Language Dedicated to Smart Cards
The use of smart cards to run software modules on demand has become a major business concern for application issuers. Such downloadable executable content requires to be trusted by...
Gilles Grimaud, Jean-Louis Lanet, Jean-Jacques Van...