Sciweavers

1835 search results - page 215 / 367
» Functional Programming of Behavior-Based Systems
Sort
View
HOTOS
2007
IEEE
15 years 9 months ago
Towards a Practical, Verified Kernel
In the paper we examine one of the issues in designing, specifying, implementing and formally verifying a small operating system kernel -- how to provide a productive and iterativ...
Kevin Elphinstone, Gerwin Klein, Philip Derrin, Ti...
CMMR
2003
Springer
121views Music» more  CMMR 2003»
15 years 10 months ago
Evolving Automatically High-Level Music Descriptors from Acoustic Signals
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the fi...
François Pachet, Aymeric Zils
EUROSYS
2009
ACM
16 years 2 months ago
xCalls: safe I/O in memory transactions
Memory transactions, similar to database transactions, allow a programmer to focus on the logic of their program and let the system ensure that transactions are atomic and isolate...
Haris Volos, Andres Jaan Tack, Neelam Goyal, Micha...
PE
2002
Springer
109views Optimization» more  PE 2002»
15 years 4 months ago
Load-dependent service queues with application to congestion control in broadband networks
: We analyze D/G/1 and M/G/1 queues where the service time for an arrival depends on the amount of work in the system upon arrival. The models are motivated by the bit dropping met...
Kin K. Leung
IJDE
2006
95views more  IJDE 2006»
15 years 5 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum