Sciweavers

7080 search results - page 1125 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 10 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
158
Voted
PAMI
2007
161views more  PAMI 2007»
15 years 3 months ago
Silhouette Coherence for Camera Calibration under Circular Motion
We present a new approach to camera calibration as a part of a complete and practical system to recover digital copies of sculpture from uncalibrated image sequences taken under t...
Carlos Hernández, Francis Schmitt, Roberto ...
ATAL
2009
Springer
15 years 10 months ago
An agent-based approach to component management
This paper details the implementation of a software framework that aids the development of distributed and self-configurable software systems. This framework is an instance of a n...
David Lillis, Rem W. Collier, Mauro Dragone, Grego...
ICDE
2001
IEEE
167views Database» more  ICDE 2001»
16 years 5 months ago
Database Managed External File Update
RDBMS's have evolved to an extent that they are used to manage almost all of traditional business data in a robust fashion. Nevertheless, a large fraction of unstructured and...
Neeraj Mittal, Hui-I Hsiao
EH
2005
IEEE
127views Hardware» more  EH 2005»
15 years 9 months ago
On the Robustness Achievable with Stochastic Development Processes
Manufacturing processes are a key source of faults in complex hardware systems. Minimizing this impact of manufacturing uncertainties is one way towards achieving fault tolerant s...
Shivakumar Viswanathan, Jordan B. Pollack
« Prev « First page 1125 / 1416 Last » Next »