Sciweavers

575 search results - page 75 / 115
» Techniques for Efficient Processing in Runahead Execution En...
Sort
View
ISSTA
2010
ACM
15 years 5 months ago
Analyzing concurrency bugs using dual slicing
Recently, there has been much interest in developing analyzes to detect concurrency bugs that arise because of data races, atomicity violations, execution omission, etc. However, ...
Dasarath Weeratunge, Xiangyu Zhang, William N. Sum...
DGO
2010
189views Education» more  DGO 2010»
15 years 2 months ago
Three-layered QoS for eGovernment web services
An applied research for the incremental evolution of a service oriented architecture for local eGovernment portals has been developed. Our reference eGovernment environment, curre...
Antonio Candiello, Andrea Albarelli, Agostino Cort...
ICSE
2009
IEEE-ACM
15 years 8 months ago
ITACA: An integrated toolbox for the automatic composition and adaptation of Web services
Adaptation is of utmost importance in systems developed by assembling reusable software services accessed through their public interfaces. This process aims at solving, as automat...
Javier Cámara, José Antonio Mart&iac...
NDSS
2008
IEEE
15 years 7 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ICWE
2010
Springer
15 years 3 months ago
Business Conversation Manager: Facilitating People Interactions in Outsourcing Service Engagements
:  Business Conversation Manager: Facilitating People Interactions in Outsourcing Service Engagements Hamid R. Motahari-Nezhad, Sven Graupner, Sharad Singhal HP Laboratories HPL...
Hamid R. Motahari Nezhad, Sven Graupner, Sharad Si...