Sciweavers

3330 search results - page 259 / 666
» software 2010
Sort
View
ECSA
2010
Springer
15 years 5 months ago
On the effectiveness of the metamorphic shield
In this paper we analyze the effectiveness of dynamic artificial diversity, i.e., artificial diversity in which the subject of the diversity is re-randomized periodically. We refer...
Anh Nguyen-Tuong, Andrew Wang, Jason Hiser, John C...
ISSTA
2010
ACM
15 years 4 months ago
Robust non-intrusive record-replay with processor extraction
With the advent of increasingly larger parallel machines, debugging is becoming more and more challenging. In particular, applications at this scale tend to behave non-determinist...
Filippo Gioachin, Gengbin Zheng, Laxmikant V. Kal&...
140
Voted
CORR
2010
Springer
122views Education» more  CORR 2010»
15 years 3 months ago
Specifying Reusable Components
Reusable software components need well-defined interfaces, rigorously and completely documented features, and a design amenable both to reuse and to formal verification; all these...
Nadia Polikarpova, Carlo A. Furia, Bertrand Meyer
ISOLA
2010
Springer
15 years 2 months ago
A Case Study in Model-Based Adaptation of Web Services
Abstract. Developing systems through the composition of reusable software services is not straightforward in most situations since different kinds of mismatch may occur among their...
Javier Cámara, José Antonio Mart&iac...
FASE
2010
Springer
15 years 1 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim