Sciweavers

1586 search results - page 284 / 318
» Modeling the evolution of operating systems: An empirical st...
Sort
View
CCS
2005
ACM
15 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
15 years 4 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
WWW
2003
ACM
15 years 10 months ago
The chatty web: emergent semantics through gossiping
This paper describes a novel approach for obtaining semantic interoperability among data sources in a bottom-up, semiautomatic manner without relying on pre-existing, global seman...
Karl Aberer, Manfred Hauswirth, Philippe Cudr&eacu...
CF
2008
ACM
14 years 11 months ago
Fpga-based prototype of a pram-on-chip processor
PRAM (Parallel Random Access Model) has been widely regarded a desirable parallel machine model for many years, but it is also believed to be "impossible in reality." As...
Xingzhi Wen, Uzi Vishkin
EOR
2008
78views more  EOR 2008»
14 years 9 months ago
Managing the overflow of intensive care patients
Abstract. Many hospitals in the Netherlands are confronted with capacity problems at their Intensive Care Units (ICUs) resulting in cancelling operations, overloading the staff wit...
Nelly Litvak, Marleen van Rijsbergen, Richard J. B...