Sciweavers

883 search results - page 119 / 177
» The RETOS operating system: kernel, tools and applications
Sort
View
CCS
2005
ACM
15 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
IPPS
2010
IEEE
14 years 8 months ago
Performance modeling of heterogeneous systems
Predicting how well applications may run on modern systems is becoming increasingly challenging. It is no longer sufficient to look at number of floating point operations and commu...
Jan Christian Meyer, Anne C. Elster
COMPSAC
2009
IEEE
15 years 2 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 2 months ago
Air traffic management with target windows: An approach using reachability
Abstract-- We present the applications of reachability methods and computational tools based on game theory to a problem in air traffic management. The use of such methods in air t...
Kostas Margellos, John Lygeros
CSCWD
2006
Springer
15 years 1 months ago
Collaborative Multidisciplinary Design in Virtual Environments
The application designers can usually define their own "virtual environments" by selecting the appropriate computing resources required, or reuse and compose existing en...
Toan Nguyen, Vittorio Selmin