Sciweavers

2111 search results - page 222 / 423
» How to Program Pervasive Systems
Sort
View
118
Voted
HICSS
2010
IEEE
166views Biometrics» more  HICSS 2010»
15 years 8 months ago
VrtProf: Vertical Profiling for System Virtualization
As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under vir...
Hussam Mousa, Kshitij Doshi, Timothy Sherwood, ElM...
118
Voted
MICRO
1999
IEEE
98views Hardware» more  MICRO 1999»
15 years 8 months ago
Access Region Locality for High-Bandwidth Processor Memory System Design
This paper studies an interesting yet less explored behavior of memory access instructions, called access region locality. Unlike the traditional temporal and spatial data localit...
Sangyeun Cho, Pen-Chung Yew, Gyungho Lee
132
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
119
Voted
AIL
2004
113views more  AIL 2004»
15 years 3 months ago
On the Ontological Status of Plans and Norms
This article describes an ontological model of norms. The basic assumption is that a substantial part of a legal system is grounded on the concept of agency. Since a legal system a...
Guido Boella, Leonardo Lesmo, Rossana Damiano
125
Voted
WSC
1998
15 years 5 months ago
Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems
This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It...
Sabina E. Jordan, Mark K. Snell, Marcella M. Madse...