Sciweavers

1748 search results - page 198 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
160
Voted
CL
2007
Springer
15 years 2 months ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains
110
Voted
SIGMETRICS
1992
ACM
128views Hardware» more  SIGMETRICS 1992»
15 years 6 months ago
MemSpy: Analyzing Memory System Bottlenecks in Programs
To cope with the increasing difference between processor and main memory speeds, modern computer systems use deep memory hierarchies. In the presence of such hierarchies, the perf...
Margaret Martonosi, Anoop Gupta, Thomas E. Anderso...
PODS
2004
ACM
189views Database» more  PODS 2004»
16 years 2 months ago
The Lixto Data Extraction Project - Back and Forth between Theory and Practice
We present the Lixto project, which is both a research project in database theory and a commercial enterprise that develops Web data extraction (wrapping) and Web service definiti...
Georg Gottlob, Christoph Koch, Robert Baumgartner,...
158
Voted
CSFW
2012
IEEE
13 years 5 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
136
Voted
BPM
2008
Springer
152views Business» more  BPM 2008»
15 years 4 months ago
Reasoning about Repairability of Workflows at Design Time
This paper describes an approach for reasoning about the repairability of workflows at design time. We propose a heuristic-based analysis of a workflow that aims at evaluating its ...
Gaston Tagni, Annette ten Teije, Frank van Harmele...