Sciweavers

1407 search results - page 232 / 282
» Using Use Cases in Executable Z
Sort
View
110
Voted
WCRE
2008
IEEE
15 years 9 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
134
Voted
IEEEPACT
2007
IEEE
15 years 8 months ago
Unified Architectural Support for Soft-Error Protection or Software Bug Detection
In this paper we propose a unified architectural support that can be used flexibly for either soft-error protection or software bug detection. Our approach is based on dynamically...
Martin Dimitrov, Huiyang Zhou
118
Voted
INFOCOM
2007
IEEE
15 years 8 months ago
Non-Cooperative Scheduling of Multiple Bag-of-Task Applications
Multiple applications that execute concurrently on heterogeneous platforms compete for CPU and network resources. In this paper we analyze the behavior of K non-cooperative schedu...
Arnaud Legrand, Corinne Touati
NDSS
2007
IEEE
15 years 8 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...
137
Voted
RTSS
2007
IEEE
15 years 8 months ago
Response-Time Analysis for Globally Scheduled Symmetric Multiprocessor Platforms
In the last years, a progressive migration from single processor chips to multi-core computing devices has taken place in the general-purpose and embedded system market. The devel...
Marko Bertogna, Michele Cirinei