Sciweavers

5109 search results - page 825 / 1022
» On Learning Limiting Programs
Sort
View
CODES
2009
IEEE
15 years 11 months ago
A variation-tolerant scheduler for better than worst-case behavioral synthesis
– There has been a recent shift in design paradigms, with many turning towards yield-driven approaches to synthesize and design systems. A major cause of this shift is the contin...
Jason Cong, Albert Liu, Bin Liu
COMPSAC
2009
IEEE
15 years 11 months ago
Defending Battery Exhaustion Attacks on Mobile Systems
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
Sungyong Shin, Taek Lee, Hoh Peter In
IAT
2009
IEEE
15 years 11 months ago
Group Recommendation with Automatic Identification of Users Communities
—Recommender systems usually propose items to single users. However, in some domains like Mobile IPTV or Satellite Systems it might be impossible to generate a program schedule f...
Ludovico Boratto, Salvatore Carta, Alessandro Ches...
NDSS
2009
IEEE
15 years 11 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
RTCSA
2009
IEEE
15 years 11 months ago
Bounding the Maximum Length of Non-preemptive Regions under Fixed Priority Scheduling
The question whether preemptive systems are better than non-preemptive systems has been debated for a long time, but only partial answers have been provided in the real-time liter...
Gang Yao, Giorgio C. Buttazzo, Marko Bertogna