Sciweavers

2400 search results - page 413 / 480
» Systems Failures
Sort
View
CCS
2008
ACM
15 years 1 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
CONEXT
2005
ACM
15 years 1 months ago
TIE breaking: tunable interdomain egress selection
— The separation of intradomain and interdomain routing has been a key feature of the Internet’s routing architecture from the early days of the ARPAnet. However, the appropria...
Renata Teixeira, Timothy G. Griffin, Mauricio G. C...
ESAW
2007
Springer
15 years 1 months ago
Progress Appraisal as a Challenging Element of Coordination in Human and Machine Joint Activity
Joint activity, as we define it, is a mutually interdependent social endeavor that requires sufficient predictability among participating parties to enable coordination. Coordinati...
Paul J. Feltovich, Jeffrey M. Bradshaw, William J....
ICWS
2010
IEEE
15 years 1 months ago
Towards Data-Aware QoS-driven Adaptation for Service Orchestrations
Several activities in service oriented computing can benefit from the knowledge of properties of a given service composition ahead of time. We will focus here on properties related...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
FECS
2008
129views Education» more  FECS 2008»
15 years 1 months ago
Assessment of Student Performance in an Internet-Based Multimedia Classroom
Much research has been devoted to the study of exclusively distance-learning paradigms for teaching various technological subjects, yet many students have not been satisfied with ...
Stephen Turner, Michael Farmer