Sciweavers

2030 search results - page 64 / 406
» The Need for Customizable Operating Systems
Sort
View
CORR
2010
Springer
167views Education» more  CORR 2010»
15 years 4 months ago
Security Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomiz...
Piotr Bania
CIBSE
2009
ACM
15 years 11 months ago
A Service-Oriented Approach for Model Management
In the Software Engineering (SE) domain, the Model Driven Engineering (MDE)1 paradigm focuses on using models as main software artifacts to provide a full description of software s...
Jorge Luis Pérez-Medina, Dominique Rieu, So...
HCI
2009
15 years 2 months ago
A Computational Implementation of a Human Attention Guiding Mechanism in MIDAS v5
In complex human-machine systems, the human operator is often required to intervene to detect and solve problems. Given this increased reliance on the human in these critical human...
Brian F. Gore, Becky L. Hooey, Christopher D. Wick...
PDP
2007
IEEE
15 years 10 months ago
SockMi: a solution for migrating TCP/IP connections
SockMi is a solution for the migration of TCP/IP connections between Linux systems. Only the migrating peer of the connection needs to reside on a Linux system. The migration is c...
Massimo Bernaschi, Francesco Casadei, Paolo Tassot...
ISDA
2009
IEEE
15 years 11 months ago
Postponed Updates for Temporal-Difference Reinforcement Learning
This paper presents postponed updates, a new strategy for TD methods that can improve sample efficiency without incurring the computational and space requirements of model-based ...
Harm van Seijen, Shimon Whiteson