Sciweavers

2025 search results - page 286 / 405
» Software performance modelling using PEPA nets
Sort
View
88
Voted
DBKDA
2009
IEEE
88views Database» more  DBKDA 2009»
15 years 4 months ago
Replay the Execution History of Rule-Based Information
Software systems in health care, such as disease and medical-record management, or financial applications, such as customer relationship and portfolio management, have very often...
Essam Mansour, Hagen Höpfner
INFORMATICALT
2010
116views more  INFORMATICALT 2010»
14 years 10 months ago
A Dynamic Network Interdiction Problem
We present a novel dynamic network interdiction model that accounts for interactions between an interdictor deploying resources on arcs in a digraph and an evader traversing the ne...
Brian J. Lunday, Hanif D. Sherali
136
Voted
DGO
2011
277views Education» more  DGO 2011»
14 years 17 days ago
Application of the MINOE regulatory analysis framework: case studies
In this paper, we describe a tool to help holistically understand, research and analyze the relationship between an ecosystem model and the relevant laws. Specifically, a software...
Julia A. Ekstrom, Gloria T. Lau, Kincho H. Law, Ma...
105
Voted
HPDC
2005
IEEE
15 years 6 months ago
Design and implementation tradeoffs for wide-area resource discovery
This paper describes the design and implementation of SWORD, a scalable resource discovery service for widearea distributed systems. In contrast to previous systems, SWORD allows ...
David L. Oppenheimer, Jeannie R. Albrecht, David A...
ECOOP
2005
Springer
15 years 6 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...