Sciweavers

890 search results - page 47 / 178
» Programming language methods in computer security
Sort
View
105
Voted
AGENTS
2001
Springer
15 years 5 months ago
An auction-based method for decentralized train scheduling
We present a computational study of an auction-based method for decentralized train scheduling. The method is well suited to the natural information and control structure of moder...
David C. Parkes, Lyle H. Ungar
WORDS
2005
IEEE
15 years 6 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
118
Voted
SAC
2010
ACM
14 years 10 months ago
A machine-checked soundness proof for an efficient verification condition generator
Verification conditions (VCs) are logical formulae whose validity implies the correctness of a program with respect to a specification. The technique of checking software properti...
Frédéric Vogels, Bart Jacobs 0002, F...
118
Voted
ENTCS
2006
176views more  ENTCS 2006»
15 years 13 days ago
Gauss: A Framework for Verifying Scientific Computing Software
High performance scientific computing software is of critical international importance as it supports scientific explorations and engineering. Software development in this area is...
Robert Palmer, Steve Barrus, Yu Yang, Ganesh Gopal...
99
Voted
IPPS
2007
IEEE
15 years 6 months ago
Babel Remote Method Invocation
Babel is a high-performance, n-way language interoperability tool for the HPC community that now includes support for distributed computing via Remote Method Invocation (RMI). We ...
Gary Kumfert, James Leek, Thomas Epperly