Sciweavers

91 search results - page 15 / 19
» Survivable key compromise in software update systems
Sort
View
ICSR
2009
Springer
14 years 7 months ago
Reusing Patterns through Design Refinement
Abstract. Refinement concepts, such as procedural and data refinement, are among the most important ideas of software engineering. In this paper, we investigate the idea of design ...
Jason O. Hallstrom, Neelam Soundarajan
TOSEM
2010
159views more  TOSEM 2010»
14 years 8 months ago
Clone region descriptors: Representing and tracking duplication in source code
n the concept of abstract clone region descriptors (CRDs), which describe clone regions using a combination of their syntactic, structural, and lexical information. We present our ...
Ekwa Duala-Ekoko, Martin P. Robillard
SACMAT
2009
ACM
15 years 4 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
TC
2002
14 years 9 months ago
UCFS-A Novel User-Space, High Performance, Customized File System for Web Proxy Servers
Web proxy caching servers play a key role in today's Web infrastructure. Previous studies have shown that disk I/O is one of the major performance bottlenecks of proxy server...
Jun Wang, Rui Min, Yingwu Zhu, Yiming Hu
CONEXT
2005
ACM
14 years 11 months ago
Location based placement of whole distributed systems
The high bandwidth and low latency of the modern internet has made possible the deployment of distributed computing platforms. The XenoServer platform provides a distributed compu...
David Spence, Jon Crowcroft, Steven Hand, Timothy ...