Sciweavers

154 search results - page 7 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
IJISEC
2006
106views more  IJISEC 2006»
14 years 11 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
CHI
2007
ACM
16 years 3 days ago
An extensible platform for the interactive exploration of Fitts' Law and related movement time models
This paper describes a new software platform for the interactive exploration of human performance models such as Fitts' law. The software is written in Java and provides a fl...
Martin J. Schedlbauer
TPDS
2002
134views more  TPDS 2002»
14 years 11 months ago
Performance of CORBA-Based Client-Server Architectures
Middleware has been introduced to provide interoperability as well as transparent location of servers in heterogeneous client-server environments. Although such benefits accrue fro...
Istabrak Abdul-Fatah, Shikharesh Majumdar
EDBT
2000
ACM
15 years 3 months ago
Performance and Availability Assessment for the Configuration of Distributed Workflow Management Systems
Workflow management systems (WFMSs) that are geared for the orchestration of enterprise-wide or even "virtual-enterprise"-style business processes across multiple organi...
Michael Gillmann, Jeanine Weißenfels, Gerhar...
FORMATS
2009
Springer
15 years 6 months ago
Exploiting Timed Automata for Conformance Testing of Power Measurements
For software development, testing is still the primary choice for investigating the correctness of a system. Automated testing is of utmost importance to support continuous integra...
Matthias Woehrle, Kai Lampka, Lothar Thiele