Sciweavers

18898 search results - page 3713 / 3780
» The Making of a Software Engineer
Sort
View
ICDE
2009
IEEE
195views Database» more  ICDE 2009»
15 years 4 months ago
The PRISM Workwench: Database Schema Evolution without Tears
— Information Systems are subject to a perpetual evolution, which is particularly pressing in Web Information Systems, due to their distributed and often collaborative nature. Su...
Carlo Curino, Hyun J. Moon, MyungWon Ham, Carlo Za...
SC
2009
ACM
15 years 4 months ago
FALCON: a system for reliable checkpoint recovery in shared grid environments
In Fine-Grained Cycle Sharing (FGCS) systems, machine owners voluntarily share their unused CPU cycles with guest jobs, as long as the performance degradation is tolerable. For gu...
Tanzima Zerin Islam, Saurabh Bagchi, Rudolf Eigenm...
CCS
2009
ACM
15 years 4 months ago
English shellcode
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an att...
Joshua Mason, Sam Small, Fabian Monrose, Greg MacM...
CCS
2009
ACM
15 years 4 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
CSFW
2009
IEEE
15 years 4 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
« Prev « First page 3713 / 3780 Last » Next »