Sciweavers

2482 search results - page 168 / 497
» Characterizing Programming Systems Allowing Program Self-ref...
Sort
View
ASPLOS
2011
ACM
12 years 12 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
EP
1998
Springer
14 years 17 days ago
Memory Scalability in Constraint-Based Multimedia Style Sheet Systems
Abstract. Multimedia style sheet systems uniformly use a constraintbased model of layout. Constraints provide a uniform mechanism for all aspects of style management and layout and...
Terry Cumaranatunge, Ethan V. Munson
USENIX
2007
13 years 10 months ago
Exploring Recovery from Operating System Lockups
Operating system lockup errors can render a computer unusable by preventing the execution other programs. Watchdog timers can be used to recover from a lockup by resetting the pro...
Francis M. David, Jeffrey C. Carlyle, Roy H. Campb...
IFIP
1994
Springer
14 years 13 days ago
Reflections on Security of Database and Datatransfer Systems in Health Care
Health care is a complex and transnational task of societies. The various institutions and individuals involved are not and should not be governed by one central authority, but ha...
Joachim Biskup, Gerrit Bleumer
DFKI
2005
Springer
13 years 10 months ago
Multiagent Systems Without Agents - Mirror-Holons for the Compilation and Enactment of Communication Structures
It is widely accepted in Distributed Artificial Intelligence that a crucial property of artificial agents is their autonomy. Whereas agent autonomy enables features of agent-base...
Matthias Nickles, Gerhard Weiß