Sciweavers

1791 search results - page 245 / 359
» Behavioral Operations
Sort
View
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
15 years 9 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
DSN
2005
IEEE
15 years 9 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
HICSS
2005
IEEE
151views Biometrics» more  HICSS 2005»
15 years 9 months ago
Inheritance in the Presence of Asynchronous Method Calls
— This paper considers a formal object-oriented model for distributed computing. Object orientation appears as a leading framework for concurrent and distributed systems. However...
Einar Broch Johnsen, Olaf Owe
HICSS
2005
IEEE
155views Biometrics» more  HICSS 2005»
15 years 9 months ago
Framework for Governance in Open Source Communities
In recent years, the development of software in open source communities has attracted immense attention from research and practice. The idea of commercial quality, free software, ...
Christoph Lattemann, Stefan Stieglitz
PADS
2005
ACM
15 years 8 months ago
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises
The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of...
Michael Liljenstam, Jason Liu, David M. Nicol, You...