Sciweavers

1072 search results - page 160 / 215
» Fuzzy decision making in embedded system design
Sort
View
EUROSYS
2006
ACM
15 years 10 months ago
A quantitative analysis of aspects in the eCos kernel
Nearly ten years after its first presentation and five years after its first application to operating systems, the suitability of AspectOriented Programming (AOP) for the devel...
Daniel Lohmann, Fabian Scheler, Reinhard Tartler, ...
116
Voted
SACMAT
2003
ACM
15 years 6 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
DAC
2008
ACM
16 years 2 months ago
Automated hardware-independent scenario identification
Scenario-based design exploits the time-varying execution behavior of applications by dynamically adapting the system on which they run. This is a particularly interesting design ...
Juan Hamers, Lieven Eeckhout
DASC
2006
IEEE
15 years 7 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
15 years 8 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...