Sciweavers

154 search results - page 7 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
IJISEC
2006
106views more  IJISEC 2006»
14 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
CHI
2007
ACM
15 years 10 months ago
An extensible platform for the interactive exploration of Fitts' Law and related movement time models
This paper describes a new software platform for the interactive exploration of human performance models such as Fitts' law. The software is written in Java and provides a fl...
Martin J. Schedlbauer
TPDS
2002
134views more  TPDS 2002»
14 years 9 months ago
Performance of CORBA-Based Client-Server Architectures
Middleware has been introduced to provide interoperability as well as transparent location of servers in heterogeneous client-server environments. Although such benefits accrue fro...
Istabrak Abdul-Fatah, Shikharesh Majumdar
EDBT
2000
ACM
15 years 1 months ago
Performance and Availability Assessment for the Configuration of Distributed Workflow Management Systems
Workflow management systems (WFMSs) that are geared for the orchestration of enterprise-wide or even "virtual-enterprise"-style business processes across multiple organi...
Michael Gillmann, Jeanine Weißenfels, Gerhar...
FORMATS
2009
Springer
15 years 4 months ago
Exploiting Timed Automata for Conformance Testing of Power Measurements
For software development, testing is still the primary choice for investigating the correctness of a system. Automated testing is of utmost importance to support continuous integra...
Matthias Woehrle, Kai Lampka, Lothar Thiele