Sciweavers

5668 search results - page 1007 / 1134
» The case for software evolution
Sort
View
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
15 years 2 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
90
Voted
TOOLS
2000
IEEE
15 years 2 months ago
Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification
This paper presents a method and a tool for building trustable OO components. The methodology is based on an integrated design and test approach for OO software components. It is ...
Benoit Baudry, Vu Le Hanh, Yves Le Traon
ASPLOS
2000
ACM
15 years 2 months ago
Power Aware Page Allocation
One of the major challenges of post-PC computing is the need to reduce energy consumption, thereby extending the lifetime of the batteries that power these mobile devices. Memory ...
Alvin R. Lebeck, Xiaobo Fan, Heng Zeng, Carla Schl...
CIA
2000
Springer
15 years 2 months ago
Applying Agents to Bioinformatics in GeneWeaver
Recent years have seen dramatic and sustained growth in the amount of genomic data being generated, including in late 1999 the first complete sequence of a human chromosome. The c...
Kevin Bryson, Michael Luck, Mike Joy, David T. Jon...
ICRA
1999
IEEE
117views Robotics» more  ICRA 1999»
15 years 2 months ago
Collision Control in Teleoperation by Virtual Force Reflection: An Application to the ROBTET System
: Well known collision avoiding approaches used in automatic robot path planning are also applied in teleoperation systems when moving in hazardous environments. In such cases, it ...
Miguel Hernando, Ernesto Gambao, E. Pinto, Antonio...
« Prev « First page 1007 / 1134 Last » Next »