Sciweavers

49 search results - page 8 / 10
» Provenance Traces
Sort
View
MASCOTS
2004
13 years 7 months ago
Size-Based Scheduling Policies with Inaccurate Scheduling Information
Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
Dong Lu, Huanyuan Sheng, Peter A. Dinda
ISCAPDCS
2003
13 years 7 months ago
Performance Monitoring of N-tier Client/Server Systems
Despite the widespread deployment of client/server technology, there seem to be no tools currently available that are adequate for analyzing and tuning the performance of client/s...
Christoph Steigner, Jürgen Wilke
ECOOP
2007
Springer
14 years 12 days ago
Towards correct evolution of components using VPA-based aspects
Abstract. Interaction protocols are a popular means to construct correct component-based systems. Aspects that modify such protocols are interesting in this context because they su...
Dong Ha Nguyen, Mario Südholt
WISA
2009
Springer
14 years 24 days ago
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementat...
J. Pan, J. I. den Hartog, Jiqiang Lu
ICLP
2005
Springer
13 years 11 months ago
Modeling Systems in CLP
We present a methodology for the modeling of complex program behavior in CLP. In the first part we present an informal description about how to represent a system in CLP. At its ...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu