Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleJanuary 2010
Formal methods applied to high-performance computing software design: a case study of MPI one-sided communication-based locking
Software—Practice & Experience (SPRE), Volume 40, Issue 1January 2010, Pages 23–43There is a growing need to address the complexity of verifying the numerous concurrent protocols employed in the high-performance computing software. Today's approaches for verification consist of testing detailed implementations of these protocols. ...
- articleDecember 2008
Evolution of the MTA architecture: the impact of security
Software—Practice & Experience (SPRE), Volume 38, Issue 15December 2008, Pages 1569–1599As the Internet matured, security became more important and formerly adequate designs became inadequate. One of the victims of the increased need for security was *sendmail*. This paper shows how its competitors improved on its design in response to the ...
- articleMay 2008
Experiences with building an intrusion-tolerant group communication system
Software—Practice & Experience (SPRE), Volume 38, Issue 6May 2008, Pages 639–666There are many group communication systems (GCSs) that provide consistent group membership and reliable, ordered multicast properties in the presence of crash faults. However, relatively few GCS implementations are able to provide these properties in ...
- articleApril 2008
A component-based framework for radio-astronomical imaging software systems
Software—Practice & Experience (SPRE), Volume 38, Issue 5April 2008, Pages 493–507This paper describes a component-based framework for radio-astronomical imaging software systems. We consider optimal re-use strategies for packages of disparate architectures brought together within a modern component framework. In this practical case ...
- articleSeptember 2006
An architecture for adaptive intrusion-tolerant applications: Experiences with Auto-adaptive and Reconfigurable Systems
- Partha Pal,
- Paul Rubel,
- Michael Atighetchi,
- Franklin Webber,
- William H. Sanders,
- Mouna Seri,
- HariGovind Ramasamy,
- James Lyons,
- Tod Courtney,
- Adnan Agbaria,
- Michel Cukier,
- Jeanna Gossett,
- Idit Keidar
Software—Practice & Experience (SPRE), Volume 36, Issue 11-12September 2006, Pages 1331–1354Applications that are part of a mission-critical information system need to maintain a usable level of key services through ongoing cyber-attacks. In addition to the well-publicized denial of service (DoS) attacks, these networked and distributed ...
- articleJuly 2005
The case for using Bridge Certificate Authorities for Grid computing: Research Articles
Software—Practice & Experience (SPRE), Volume 35, Issue 9July 2005, Pages 817–826As Grid deployments increase, the challenge remains to create a scalable, multi-organizational authentication infrastructure. Public key infrastructures (PKIs) are widely used for authentication in Grids, due in large part to the success of the Globus ...
- articleJuly 2005
The MyProxy online credential repository: Research Articles
Software—Practice & Experience (SPRE), Volume 35, Issue 9July 2005, Pages 801–816The MyProxy online credential repository has been used by the Grid computing community for over four years for managing security credentials in the Grid public key infrastructure. MyProxy improves usability by giving users access to their credentials ...
- articleJune 2005
Design, implementation, and performance of an automatic configuration service for distributed component systems: Research Articles
Software—Practice & Experience (SPRE), Volume 35, Issue 7June 2005, Pages 667–703Component technology promotes code reuse by enabling the construction of complex applications by assembling off-the-shelf components. However, components depend on certain characteristics of the environment in which they execute. They depend on other ...
- articleSeptember 1983