Sciweavers

1130 search results - page 220 / 226
» Developing Trust In Virtual Software Development Teams
Sort
View
CCS
2009
ACM
15 years 6 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
84
Voted
EICS
2009
ACM
15 years 6 months ago
Edit, inspect and connect your surroundings: a reference framework for meta-UIs
Discovering and unlocking the full potential of complex pervasive environments is still approached in application-centric ways. A set of statically deployed applications often deï...
Geert Vanderhulst, Daniel Schreiber, Kris Luyten, ...
ICAC
2008
IEEE
15 years 6 months ago
Enabling Autonomic Meta-Scheduling in Grid Environments
Grid computing supports workload execution on computing resources that are shared across a set of collaborative organizations. At the core of workload management for Grid computin...
Yanbin Liu, Seyed Masoud Sadjadi, Liana Fong, Ivan...
CASES
2006
ACM
15 years 5 months ago
Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems
Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network ...
Lan S. Bai, Lei Yang, Robert P. Dick
HASKELL
2006
ACM
15 years 5 months ago
Strongly typed memory areas programming systems-level data structures in a functional language
Modern functional languages offer several attractive features to support development of reliable and secure software. However, in our efforts to use Haskell for systems programmin...
Iavor S. Diatchki, Mark P. Jones