Sciweavers

1855 search results - page 198 / 371
» System Consequence
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 11 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
ECRTS
2002
IEEE
15 years 9 months ago
'QoS Safe' Kernel Extensions for Real-Time Resource Management
General-purpose operating systems are ill-equipped to meet the quality of service (QoS) requirements of complex real-time applications. Consequently, many classes of realtime appl...
Richard West, Jason Gloudon
COMPSAC
2006
IEEE
15 years 10 months ago
Tool Support to Model-based Quality Analysis of Software Architecture
This paper presents an automated software tool SQUARE (Software QUality and ARchitecture modelling Environment). It is designed and implemented to support the analysis of software...
Qian Zhang, Jian Wu, Hong Zhu
SEKE
2009
Springer
15 years 9 months ago
Improving Negotiations through Fuzzy Cognitive Maps
In a decision-making process, a systematic method to manage and measure negotiation aspects provides crucial information to negotiators and has emerged as a key factor to determin...
Sérgio Assis Rodrigues, Tiago Santos da Sil...
BPM
2008
Springer
144views Business» more  BPM 2008»
15 years 6 months ago
Supporting Flexible Processes through Recommendations Based on History
Abstract. In today's fast changing business environment flexible Process Aware Information Systems (PAISs) are required to allow companies to rapidly adjust their business pro...
Helen Schonenberg, Barbara Weber, Boudewijn F. van...