Sciweavers

674 search results - page 96 / 135
» Toward Self-Stabilizing Operating Systems
Sort
View
CN
2007
133views more  CN 2007»
14 years 10 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
PERCOM
2005
ACM
15 years 10 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
74
Voted
DATE
2009
IEEE
111views Hardware» more  DATE 2009»
15 years 5 months ago
Increased accuracy through noise injection in abstract RTOS simulation
RTOS Simulation Henning Zabel, Wolfgang Mueller Universität Paderborn, C-LAB Fürstenallee 11, D-33102 Paderborn, Germany —Today, mobile and embedded real-time systems have to c...
Henning Zabel, Wolfgang Mueller
ICAC
2008
IEEE
15 years 4 months ago
CARVE: A Cognitive Agent for Resource Value Estimation
Recently, industry has begun investigating and moving towards utility computing, where computational resources (processing, memory and I/O) are availably on demand at a market cos...
Jonathan Wildstrom, Peter Stone, Emmett Witchel
SRDS
2007
IEEE
15 years 4 months ago
An Analytical Framework and Its Applications for Studying Brick Storage Reliability
The reliability of a large-scale storage system is influenced by a complex set of inter-dependent factors. This paper presents a comprehensive and extensible analytical framework ...
Ming Chen, Wei Chen, Likun Liu, Zheng Zhang