Sciweavers

853 search results - page 70 / 171
» Delimited Continuations in Operating Systems
Sort
View
IAW
2003
IEEE
15 years 3 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
SC
2003
ACM
15 years 3 months ago
Handling Heterogeneity in Shared-Disk File Systems
We develop and evaluate a system for load management in shared-disk file systems built on clusters of heterogeneous computers. The system generalizes load balancing and server pr...
Changxun Wu, Randal C. Burns
HYBRID
1997
Springer
15 years 2 months ago
Time-Deterministic Hybrid Transition Systems
Hybrid transition systems in their full generality describe continuous behaviour by a set of equations in each mode an algebraic or di erential equation for each state variable in ...
Simin Nadjm-Tehrani
HYBRID
1997
Springer
15 years 1 months ago
On-Line, Reflexive Constraint Satisfaction for Hybrid Systems: First Steps
Abstract. We can achieve guaranteed constraint satisfaction of a hybrid dynamical system (which takes into account the underlying continuous dynamics) in a simple, hierarchical con...
Michael S. Branicky
SIGSAND
2008
14 years 11 months ago
Design of Fractal-Based Systems Within MDA: Platform Independent Modelling
: Today's businesses must continuously adapt to changing external environment in accelerated time frames. This requires businesses to decrease costs and time of the very proce...
Erika Asnina, Janis Osis, Marite Kirikova