Sciweavers

70 search results - page 13 / 14
» Combining Monitors for Runtime System Verification
Sort
View
SAC
2003
ACM
13 years 12 months ago
Distributed Query Adaptation and Its Trade-offs
Adaptive query processing in large distributed systems has seen increasing importance due to the rising environmental fluctuations in a growing Internet. We describe Ginga, an ad...
Henrique Paques, Ling Liu, Calton Pu
PLDI
2005
ACM
14 years 4 days ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
CODES
2005
IEEE
14 years 6 days ago
DVS for buffer-constrained architectures with predictable QoS-energy tradeoffs
We present a new scheme for dynamic voltage and frequency scaling (DVS) for processing multimedia streams on architectures with restricted buffer sizes. The main advantage of our ...
Alexander Maxiaguine, Samarjit Chakraborty, Lothar...
HASE
2008
IEEE
13 years 6 months ago
Randomization Based Probabilistic Approach to Detect Trojan Circuits
In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be...
Susmit Jha, Sumit Kumar Jha
ICDE
1993
IEEE
120views Database» more  ICDE 1993»
13 years 10 months ago
Adaptable Pointer Swizzling Strategies in Object Bases
In this article, different techniques for 'pointer swizzling" are classified and evaluated for optimizing the access to main-memory resident persistent objects. To speed ...
Alfons Kemper, Donald Kossmann