Sciweavers

364 search results - page 47 / 73
» Monitoring, Analyzing, and Controlling Internet-scale System...
Sort
View
DMSN
2010
ACM
14 years 10 months ago
Provenance-based trustworthiness assessment in sensor networks
As sensor networks are being increasingly deployed in decisionmaking infrastructures such as battlefield monitoring systems and SCADA(Supervisory Control and Data Acquisition) sys...
Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino
152
Voted
SIGMOD
2005
ACM
151views Database» more  SIGMOD 2005»
15 years 9 months ago
The 8 requirements of real-time stream processing
Applications that require real-time processing of high-volume data steams are pushing the limits of traditional data processing infrastructures. These stream-based applications in...
Michael Stonebraker, Ugur Çetintemel, Stanley B. ...
125
Voted
POPL
2003
ACM
15 years 10 months ago
Selective memoization
We present a framework for applying memoization selectively. The framework provides programmer control over equality, space usage, and identification of precise dependences so tha...
Umut A. Acar, Guy E. Blelloch, Robert Harper
MSR
2006
ACM
15 years 3 months ago
Productivity analysis of Japanese enterprise software development projects
To clarify the relation between controllable attributes of a software development and its productivity, this paper experimentally analyzed a software project repository (SEC repos...
Masateru Tsunoda, Akito Monden, Hiroshi Yadohisa, ...
PLDI
2005
ACM
15 years 3 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker