Sciweavers

10625 search results - page 1900 / 2125
» Supporting delay-intolerant applications
Sort
View
PADS
2005
ACM
15 years 4 months ago
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises
The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of...
Michael Liljenstam, Jason Liu, David M. Nicol, You...
PASTE
2005
ACM
15 years 4 months ago
Representation-independent program analysis
Program analysis has many applications in software engineering and high-performance computation, such as program understanding, debugging, testing, reverse engineering, and optimi...
Michelle Mills Strout, John M. Mellor-Crummey, Pau...
SAC
2005
ACM
15 years 4 months ago
Knowledge based approach to semantic composition of teams in an organization
Finding rapidly suitable experts in an organization to compose a team able to solve specific tasks is a typical problem in large consulting firms. In this paper we present a Des...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
SC
2005
ACM
15 years 4 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
SIGCSE
2005
ACM
179views Education» more  SIGCSE 2005»
15 years 4 months ago
Design patterns for database pedagogy: a proposal
Courses in Relational Databases largely use a domain-specific design approach different from that used in the rest of the curriculum. Use of the Unified Process, UML, and Design P...
Thomas J. Marlowe, Cyril S. Ku, James W. Benham
« Prev « First page 1900 / 2125 Last » Next »