Sciweavers

4957 search results - page 934 / 992
» Simplifying Distributed System Development
Sort
View
GRID
2005
Springer
15 years 10 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
136
Voted
SAB
2004
Springer
182views Optimization» more  SAB 2004»
15 years 10 months ago
The SWARM-BOTS Project
This paper provides an overview of the SWARM-BOTS project, a robotic project sponsored by the Future and Emerging Technologies program of the European Commission. The paper illustr...
Marco Dorigo, Elio Tuci, Roderich Groß, Vito...
149
Voted
CASES
2003
ACM
15 years 10 months ago
Clustered calculation of worst-case execution times
Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...
130
Voted
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
15 years 9 months ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli
EUROSYS
2010
ACM
15 years 9 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...