Sciweavers

113 search results - page 22 / 23
» Requirements-Related Risks in Critical Systems
Sort
View
ASPLOS
2009
ACM
13 years 9 months ago
Efficient online validation with delta execution
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...
Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
TVCG
2010
151views more  TVCG 2010»
13 years 4 months ago
Uncertainty-Aware Guided Volume Segmentation
—Although direct volume rendering is established as a powerful tool for the visualization of volumetric data, efficient and reliable feature detection is still an open topic. Us...
Jörg-Stefan Praßni, Timo Ropinski, Klau...
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 12 days ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
WIMOB
2008
IEEE
14 years 4 days ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
ICCCN
2007
IEEE
14 years 3 days ago
Interplay of Security and Reliability using Non-uniform Checkpoints
Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way ...
Kiranmai Bellam, Raghava K. Vudata, Xiao Qin, Zili...