Sciweavers

7778 search results - page 1177 / 1556
» Designing Controllers for Reachability
Sort
View
USENIX
2004
15 years 6 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
WSC
2004
15 years 6 months ago
Impact of Production Run Length on Supply Chain Performance
This paper documents an experiment designed to show the value of simulation in understanding the relationship between production run lengths and overall supply chain performance. ...
David J. Parsons, Robin J. Clark, Kevin L. Payette
DIMVA
2009
15 years 6 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
158
Voted
HPDC
2010
IEEE
15 years 6 months ago
XCo: explicit coordination to prevent network fabric congestion in cloud computing cluster platforms
Large cluster-based cloud computing platforms increasingly use commodity Ethernet technologies, such as Gigabit Ethernet, 10GigE, and Fibre Channel over Ethernet (FCoE), for intra...
Vijay Shankar Rajanna, Smit Shah 0002, Anand Jahag...
GECCO
2008
Springer
183views Optimization» more  GECCO 2008»
15 years 6 months ago
UMDAs for dynamic optimization problems
This paper investigates how the Univariate Marginal Distribution Algorithm (UMDA) behaves in non-stationary environments when engaging in sampling and selection strategies designe...
Carlos M. Fernandes, Cláudio F. Lima, Agost...
« Prev « First page 1177 / 1556 Last » Next »