Sciweavers

2421 search results - page 364 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICRA
2009
IEEE
126views Robotics» more  ICRA 2009»
15 years 11 months ago
Leaving Flatland: Toward real-time 3D navigation
— We report our first experiences with Leaving Flatland, an exploratory project that studies the key challenges of closing the loop between autonomous perception and action on c...
Benoit Morisset, Radu Bogdan Rusu, Aravind Sundare...
ACSAC
2008
IEEE
15 years 11 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
IPPS
2006
IEEE
15 years 10 months ago
A framework to develop symbolic performance models of parallel applications
Performance and workload modeling has numerous uses at every stage of the high-end computing lifecycle: design, integration, procurement, installation and tuning. Despite the trem...
Sadaf R. Alam, Jeffrey S. Vetter
UIST
2006
ACM
15 years 10 months ago
SwingStates: adding state machines to the swing toolkit
This article describes SwingStates, a library that adds state machines to the Java Swing user interface toolkit. Unlike traditional approaches, which use callbacks or listeners to...
Caroline Appert, Michel Beaudouin-Lafon
SC
2005
ACM
15 years 10 months ago
Optimized Data Loading for a Multi-Terabyte Sky Survey Repository
Advanced instruments in a variety of scientific domains are collecting massive amounts of data that must be postprocessed and organized to support research activities. Astronomers...
Y. Dora Cai, Ruth A. Aydt, Robert Brunner