Sciweavers

8493 search results - page 1348 / 1699
» Implementing a distributed firewall
Sort
View
EUROPAR
2009
Springer
15 years 9 months ago
Real-Time Issues in Live Migration of Virtual Machines
This paper addresses the issue of how to meet the strict timing constraints of (soft) real-time virtualized applications while the Virtual Machine (VM) hosting them is undergoing a...
Fabio Checconi, Tommaso Cucinotta, Manuel Stein
CCS
2001
ACM
15 years 9 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
EMO
2001
Springer
109views Optimization» more  EMO 2001»
15 years 9 months ago
Specification of Genetic Search Directions in Cellular Multi-objective Genetic Algorithms
When we try to implement a multi-objective genetic algorithm (MOGA) with variable weights for finding a set of Pareto optimal solutions, one difficulty lies in determining appropri...
Tadahiko Murata, Hisao Ishibuchi, Mitsuo Gen
EMSOFT
2001
Springer
15 years 9 months ago
A Network-Centric Approach to Embedded Software for Tiny Devices
The ability to incorporate low-power, wireless communication into embedded devices gives rise to a new genre of embedded software that is distributed, dynamic, and adaptive. This p...
David E. Culler, Jason L. Hill, Philip Buonadonna,...
164
Voted
ER
2001
Springer
136views Database» more  ER 2001»
15 years 9 months ago
A Randomized Approach for the Incremental Design of an Evolving Data Warehouse
A Data Warehouse (DW) can be used to integrate data from multiple distributed data sources. A DW can be seen as a set of materialized views that determine its schema and its conten...
Dimitri Theodoratos, Theodore Dalamagas, Alkis Sim...
« Prev « First page 1348 / 1699 Last » Next »