Sciweavers

124 search results - page 9 / 25
» A Module System for Isolating Untrusted Software Extensions
Sort
View
RAID
2010
Springer
14 years 8 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
EMSOFT
2006
Springer
15 years 1 months ago
Multi-level software reconfiguration for sensor networks
In-situ reconfiguration of software is indispensable in embedded networked sensing systems. It is required for re-tasking a deployed network, fixing bugs, introducing new features...
Rahul Balani, Chih-Chieh Han, Ram Kumar Rengaswamy...
CEEMAS
2005
Springer
15 years 3 months ago
Intelligent Virtual Environments for Training: An Agent-Based Approach
In this paper we propose an architecture for the development of Intelligent Virtual Environments for Training, which is based on a collection of cooperative software agents. The ï¬...
Angélica de Antonio, Jaime Ramírez, ...
ICWL
2004
Springer
15 years 3 months ago
CUBES: Providing Flexible Learning Environment for Virtual Universities
Abstract. To enable an online virtual university, a learning environment covering the entire spectrum of the learning and management process is required. However, constructing such...
Peifeng Xiang, Yuanchun Shi, Weijun Qin, Xin Xiang
SIGSOFT
2000
ACM
15 years 1 months ago
The universe model: an approach for improving the modularity and reliability of concurrent programs
We present the universe model,a new approach to concurrencymanagement that isolates concurrency concerns and represents them in the modular interface of a component. This approach...
Reimer Behrends, Kurt Stirewalt