Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
The use of reflection becomes today popular for the implementation of non-functional mechanisms such as for fault-tolerance. The main benefits of reflection are separation of conc...
Deep inference is a proof theoretical methodology that generalizes the traditional notion of inference in the sequent calculus: in contrast to the sequent calculus, the deductive ...
—This paper describes the design and implementation of an inference engine for the execution of Fuzzy Inference Systems (FIS), the architecture of the system is presented, and th...
We have created Zap, a novel system for transparent migration of legacy and networked applications. Zap provides a thin virtualization layer on top of the operating system that in...
Steven Osman, Dinesh Subhraveti, Gong Su, Jason Ni...