Sciweavers

186 search results - page 25 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
DAC
2006
ACM
16 years 2 months ago
High-level power management of embedded systems with application-specific energy cost functions
Most existing dynamic voltage scaling (DVS) schemes for multiple tasks assume an energy cost function (energy consumption versus execution time) that is independent of the task ch...
Youngjin Cho, Naehyuck Chang, Chaitali Chakrabarti...
83
Voted
AUIC
2004
IEEE
15 years 5 months ago
e-Ghosts: Leaving Virtual Footprints in Ubiquitous Workspaces
Ubiquitous workspaces are future media-rich environments that employ new forms of operating systems and services to coordinate and manage interactions between people, multiple dis...
Michael Vernik, Steven Johnson, Rudi Vernik
115
Voted
DLOG
1996
15 years 3 months ago
Can Description Logics Be Used in Real-Life Knowledge-Based Systems?
In 1995, I nished my Ph.D. project which was focused on the selection of adequate Knowledge-Representation Systems (KRSs) for research applications. When I started working at the ...
Piet-Hein Speel
ISLPED
2009
ACM
188views Hardware» more  ISLPED 2009»
15 years 8 months ago
Transaction-based adaptive dynamic voltage scaling for interactive applications
In an interactive embedded system, special task execution patterns and scheduling constraints exist due to frequent human-computer interactions. This paper proposes a transaction-...
Xia Zhao, Yao Guo, Xiangqun Chen
NDSS
2008
IEEE
15 years 8 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...