Sciweavers

6530 search results - page 961 / 1306
» Application Integration
Sort
View
CCS
2009
ACM
15 years 11 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
CODES
2007
IEEE
15 years 11 months ago
A code-generator generator for multi-output instructions
We address the problem of instruction selection for Multi-Output Instructions (MOIs), producing more than one result. Such inherently parallel hardware instructions are very commo...
Hanno Scharwächter, Jonghee M. Youn, Rainer L...
VTC
2007
IEEE
130views Communications» more  VTC 2007»
15 years 11 months ago
Data Stream Processing Infrastructure for Intelligent Transport Systems
— Intelligence Transportation Systems are critical to improve the efficiency of modern transportation by reducing congestions, providing real time road conditions. A system that...
Eric Bouillet, Mark Feblowitz, Zhen Liu, Anand Ran...
SEMWEB
2007
Springer
15 years 11 months ago
Semantic Enterprise Technologies
Abstract. Nowadays enterprises request information technologies that leverage structured and unstructured information for providing a single integrated view of business problems in...
Massimo Ruffolo, Luigi Guadagno, Inderbir Sidhu
SENSYS
2006
ACM
15 years 10 months ago
Capturing high-frequency phenomena using a bandwidth-limited sensor network
Small-form-factor, low-power wireless sensors—motes—are convenient to deploy, but lack the bandwidth to capture and transmit raw high-frequency data, such as human voices or n...
Ben Greenstein, Christopher Mar, Alex Pesterev, Sh...