Sciweavers

3104 search results - page 506 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 10 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
POPL
2012
ACM
14 years 11 hour ago
Deciding choreography realizability
Since software systems are becoming increasingly more concurrent and distributed, modeling and analysis of interactions among their components is a crucial problem. In several app...
Samik Basu, Tevfik Bultan, Meriem Ouederni
EDBT
2010
ACM
189views Database» more  EDBT 2010»
15 years 9 months ago
Efficient physical operators for cost-based XPath execution
The creation of a generic and modular query optimization and processing infrastructure can provide significant benefits to XML data management. Key pieces of such an infrastructur...
Haris Georgiadis, Minas Charalambides, Vasilis Vas...
CP
2007
Springer
15 years 10 months ago
Scheduling Conditional Task Graphs
The increasing levels of system integration in Multi-Processor System-on-Chips (MPSoCs) emphasize the need for new design flows for efficient mapping of multi-task applications o...
Michele Lombardi, Michela Milano
MIRAGE
2007
Springer
15 years 10 months ago
Hand Gesture Recognition with a Novel IR Time-of-Flight Range Camera-A Pilot Study
Abstract We present a gesture recognition system for recognizing hand movements in near realtime. The system uses a infra-red time-of-flight range camera with up to 30 Hz framerat...
Pia Breuer, Christian Eckes, Stefan Müller 00...