Sciweavers

1229 search results - page 207 / 246
» Live updating operating systems using virtualization
Sort
View
CC
2001
Springer
121views System Software» more  CC 2001»
15 years 6 months ago
Constant-Time Root Scanning for Deterministic Garbage Collection
Root scanning is the task of identifying references to heap objects that are stored outside of the heap itself, in global and local variables and on the execution stack. Root scann...
Fridtjof Siebert
JMLR
2002
125views more  JMLR 2002»
15 years 1 months ago
Lyapunov Design for Safe Reinforcement Learning
Lyapunov design methods are used widely in control engineering to design controllers that achieve qualitative objectives, such as stabilizing a system or maintaining a system'...
Theodore J. Perkins, Andrew G. Barto
HAPTICS
2003
IEEE
15 years 6 months ago
Electro-Rheological Fluidic Actuators for Haptic Vehicular Instrument Controls
Force-feedback mechanisms have been designed to simplify and enhance the human-vehicle interface. The increase in secondary controls within vehicle cockpits has created a desire f...
J. Melli-Huber, Brian Weinberg, Avi Fisch, Jason N...
HPDC
2007
IEEE
15 years 7 months ago
A statistical approach to risk mitigation in computational markets
We study stochastic models to mitigate the risk of poor Quality-of-Service (QoS) in computational markets. Consumers who purchase services expect both price and performance guaran...
Thomas Sandholm, Kevin Lai
CCS
2010
ACM
15 years 1 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler