Sciweavers

4445 search results - page 133 / 889
» Reflective Authorization Systems
Sort
View
CCS
2006
ACM
15 years 8 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
EOR
2006
105views more  EOR 2006»
15 years 4 months ago
Evaluating cost taxonomies for information systems management
The consideration of costs, benefits and risks underpin many Information System (IS) evaluation decisions. Yet, vendors and project-champions alike tend to identify and focus much...
Zahir Irani, Ahmad Ghoneim, Peter E. D. Love
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
15 years 10 months ago
Implementation issues for an interactive evolutionary computation system
The design and development of an Interactive Evolutionary Computation (IEC) system needs to take into account the implementation issues found when delivering the system to “Real...
Mark R. N. Shackelford
WOSS
2004
ACM
15 years 10 months ago
Exploiting architectural prescriptions for self-managing, self-adaptive systems: a position paper
We propose a high-level approach to software architecture that bridges the gap between system requirements (in the problem space) and the architectural design (in the solution spa...
Matthew J. Hawthorne, Dewayne E. Perry
HICSS
2000
IEEE
129views Biometrics» more  HICSS 2000»
15 years 8 months ago
A New Tool for Visualization and Animation of Power Component and System Operation
A new tool for computing and visualizing the operation of power system components and systems is presented. One component of the tool is a time domain simulator that operates in t...
A. P. Sakis Meliopoulos, George J. Cokkinides, Ben...