Sciweavers

237 search results - page 39 / 48
» Towards engineering transparency as a requirement in socio-t...
Sort
View
EUROSYS
2008
ACM
15 years 7 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
IMAGING
2000
15 years 2 days ago
Color Management within a Spectral Image Visualization Tool
Recent developments in spectral imaging are pointing toward a future where the demands on color management will require a richer infrastructure than that which is currently offere...
Mitchell R. Rosen, Mark D. Fairchild, Garrett M. J...
CBSQ
2003
Springer
15 years 4 months ago
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability
The use of formal model based (FMB) methods to evaluate the quality of the components is an important research area. Except for a growing number of exceptions, FMB methods are sti...
Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon
ETFA
2006
IEEE
15 years 4 months ago
An IEC61499 Execution Environment for an aJile-based Field Device
—The IEC61499 standard is the first step towards the development of the next generation agile manufacturing systems where distribution, interoperability and re-configuration are ...
Kleanthis Thramboulidis, Nikolaos Papakonstantinou
134
Voted
WOSP
1998
ACM
15 years 2 months ago
Poems: end-to-end performance design of large parallel adaptive computational systems
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
Ewa Deelman, Aditya Dube, Adolfy Hoisie, Yong Luo,...