Sciweavers

3310 search results - page 349 / 662
» Aspect-aware operating system development
Sort
View
141
Voted
JNW
2006
142views more  JNW 2006»
15 years 5 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
135
Voted
IPPS
1999
IEEE
15 years 9 months ago
COWL: Copy-On-Write for Logic Programs
In order for parallel logic programming systems to become popular, they should serve the broadest range of applications. To achieve this goal, designers of parallel logic programm...
Vítor Santos Costa
CHK
1999
47views more  CHK 1999»
15 years 4 months ago
Gypsy Reason: Niklas Luhmann's Sociological Enlightenment
: Niklas Luhmann died in November 1998. He had been elaborating his theory of the society for more than thirty years which has been well received in many quarters of society in the...
Dirk Baecker
188
Voted
SIGCSE
2002
ACM
218views Education» more  SIGCSE 2002»
15 years 4 months ago
Participatory design in a human-computer interaction course: teaching ethnography methods to computer scientists
Empirical evidence shows the ability for computer technology to deliver on its promises of enhancing our quality of life relies on how well the application fits our understanding ...
Jerry B. Weinberg, Mary L. Stephen
152
Voted
TMI
1998
97views more  TMI 1998»
15 years 4 months ago
Optimization and FROC Analysis of Rule-Based Detection Schemes Using a Multiobjective Approach
Abstract—Computerized detection schemes have the potential of increasing diagnostic accuracy in medical imaging by alerting radiologists to lesions that they initially overlooked...
Mark A. Anastasio, Matthew A. Kupinski, Robert M. ...