Sciweavers

25156 search results - page 75 / 5032
» Applications for conscious systems
Sort
View
AINA
2007
IEEE
14 years 3 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
ISCAS
2005
IEEE
273views Hardware» more  ISCAS 2005»
14 years 2 months ago
A distributed slack bus model and its impact on distribution system application techniques
—Distribution system operating environments are changing rapidly. For example, with the steady and significant increase in dispersed generation expected, planning and operating a...
Shiqiong Tong, Michael Kleinberg, Karen Miu
VLDB
2005
ACM
109views Database» more  VLDB 2005»
14 years 2 months ago
Parallel Execution of Test Runs for Database Application Systems
In a recent paper [8], it was shown how tests for database application systems can be executed efficiently. The challenge was to control the state of the database during testing ...
Florian Haftmann, Donald Kossmann, Eric Lo
DSN
2004
IEEE
14 years 21 days ago
Dependable Adaptive Real-Time Applications in Wormhole-based Systems
This paper describes and discusses the work carried on in the context of the CORTEX project, for the development of adaptive real-time applications in wormhole based systems. The ...
Pedro Martins, Paulo Jorge Paiva de Sousa, Antonio...
WISES
2003
13 years 10 months ago
Prospects on Software-Agents-Based Applications in Embedded Systems
- Software agents have been already introduced successfully in the scope of embedded technology as smart controllers of intelligent systems. This paper presents a further applicati...
Yoseba K. Penya