Sciweavers

357 search results - page 32 / 72
» From C Programs to the Configure-Execute Model
Sort
View
ISW
2010
Springer
15 years 2 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
15 years 8 months ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...
CASES
2006
ACM
15 years 8 months ago
Reaching fast code faster: using modeling for efficient software thread integration on a VLIW DSP
When integrating software threads together to boost performance on a processor with instruction-level parallel processing support, it is rarely clear which code regions should be ...
Won So, Alexander G. Dean
CEC
2009
IEEE
15 years 11 months ago
The engineering of concurrent simulations of complex systems
— Concurrent process-oriented programming is a natural medium for simulating complex systems, particularly systems where many simple components interact in an environment (which ...
Fiona A. C. Polack, Paul S. Andrews, Adam T. Samps...
130
Voted
SERP
2004
15 years 5 months ago
Software Specification of MERTIS: Modifiable Extensible Real-Time Interactive Simulation System
Game and simulation development is a difficult process because there are many low level infrastructure concerns that need to be addressed. This is a barrier to development for ine...
Frederick C. Harris Jr., Leandro Basallo, Ryan E. ...