Sciweavers

531 search results - page 67 / 107
» An Approach to Rapid Prototyping of Large Multi-Agent System...
Sort
View
SSDBM
2005
IEEE
132views Database» more  SSDBM 2005»
14 years 2 months ago
Co-Scheduling of Computation and Data on Computer Clusters
Scientific investigations have to deal with rapidly growing amounts of data from simulations and experiments. During data analysis, scientists typically want to extract subsets o...
Alexandru Romosan, Doron Rotem, Arie Shoshani, Der...
ACSAC
2002
IEEE
14 years 1 months ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
DIMVA
2010
13 years 10 months ago
Covertly Probing Underground Economy Marketplaces
Cyber-criminals around the world are using Internet-based communication channels to establish trade relationships and complete fraudulent transactions. Furthermore, they control an...
Hanno Fallmann, Gilbert Wondracek, Christian Platz...
GPCE
2007
Springer
14 years 3 months ago
Generative programming techniques for Java library migration
Embedded systems can be viewed as scaled-down versions of their one counterparts. In many cases, the software abstractions and libraries for embedded systems can be derived from l...
Victor L. Winter, Azamatbek Mametjanov
JSW
2007
102views more  JSW 2007»
13 years 8 months ago
Model-driven Engineering for Early QoS Validation of Component-based Software Systems
— Model-driven engineering (MDE) techniques are increasingly being used to address many of the development and operational lifecycle concerns of large-scale component-based syste...
James H. Hill, Aniruddha S. Gokhale