Sciweavers

853 search results - page 111 / 171
» Delimited Continuations in Operating Systems
Sort
View
ACSAC
1998
IEEE
15 years 2 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
COORDINATION
2009
Springer
15 years 1 months ago
From Coordination to Stochastic Models of QoS
Abstract. Reo is a channel-based coordination model whose operational semantics is given by Constraint Automata (CA). Quantitative Constraint Automata extend CA (and hence, Reo) wi...
Farhad Arbab, Tom Chothia, Rob van der Mei, Sun Me...
AIPS
1996
14 years 11 months ago
Planning Experiments: Resolving Interactions between Two Planning Spaces
Learning from experimentation allows a system to acquire planning domain knowledge by correcting its knowledge when an action execution fails. Experiments are designed and planned...
Yolanda Gil
SOCIALCOM
2010
14 years 7 months ago
Managed Mission Assurance - Concept, Methodology and Runtime Support
We interpret "mission assurance" to mean the guarantee that Mission Essential Functionality (MEF) provided by an information system is continued despite partial failures ...
Partha Pratim Pal, Kurt Rohloff, Michael Atighetch...
CCS
2011
ACM
13 years 10 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...