Sciweavers

2863 search results - page 559 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
BTW
2007
Springer
100views Database» more  BTW 2007»
15 years 3 months ago
On Deriving Net Change Information From Change Logs - The DELTALAYER-Algorithm
: The management of change logs is crucial in different areas of information systems like data replication, data warehousing, and process management. One barrier that hampers the (...
Stefanie Rinderle, Martin Jurisch, Manfred Reicher...
RTCSA
1999
IEEE
15 years 1 months ago
Scheduling Fixed-Priority Tasks with Preemption Threshold
While it is widely believed that preemptability is a necessary requirement for developing real-time software, there are additional costs involved with preemptive scheduling, as co...
Yun Wang, Manas Saksena
CCS
2006
ACM
15 years 1 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
115
Voted
EUSFLAT
2009
163views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
A Fuzzy Set Approach to Ecological Knowledge Discovery
Besides the problem of searching for effective methods for extracting knowledge from large databases (KDD) there are some additional problems with handling ecological data, namely ...
Arkadiusz Salski
ICRA
2007
IEEE
138views Robotics» more  ICRA 2007»
15 years 3 months ago
Teleoperation of Steerable Needles
— Needles are commonly used in medical practice as a minimally invasive means to reach subsurface targets for diagnosis or therapy delivery. Recent results indicate that steerabl...
Joseph M. Romano, Robert J. Webster III, Allison M...