Sciweavers

212 search results - page 36 / 43
» Consistent policy enforcement in distributed systems using m...
Sort
View
ICS
2005
Tsinghua U.
15 years 6 months ago
A performance-conserving approach for reducing peak power consumption in server systems
The combination of increasing component power consumption, a desire for denser systems, and the required performance growth in the face of technology-scaling issues are posing eno...
Wesley M. Felter, Karthick Rajamani, Tom W. Keller...
IEEESP
2007
98views more  IEEESP 2007»
15 years 1 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
CCS
2010
ACM
15 years 1 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
CSCW
2010
ACM
15 years 10 months ago
The work of sustaining order in wikipedia: the banning of a vandal
In this paper, we examine the social roles of software tools in the English-language Wikipedia, specifically focusing on autonomous editing programs and assisted editing tools. Th...
R. Stuart Geiger, David Ribes
IJRR
2008
186views more  IJRR 2008»
15 years 1 months ago
Automated Design of Adaptive Controllers for Modular Robots using Reinforcement Learning
Designing distributed controllers for self-reconfiguring modular robots has been consistently challenging. We have developed a reinforcement learning approach which can be used bo...
Paulina Varshavskaya, Leslie Pack Kaelbling, Danie...