Sciweavers

50 search results - page 8 / 10
» Creating Services with Hard Guarantees from Cycle-Harvesting...
Sort
View
BPM
2008
Springer
217views Business» more  BPM 2008»
13 years 9 months ago
Detecting Regulatory Compliance for Business Process Models through Semantic Annotations
A given business process may face a large number of regulatory obligations the process may or comply with. Providing tools and techniques through which an evaluation of the complia...
Guido Governatori, Jörg Hoffmann, Shazia Wasi...
AGENTS
2000
Springer
14 years 1 days ago
Towards a fault-tolerant multi-agent system architecture
Multi-agent systems are prone to failures typical of any distributed system. Agents and resources may become unavailable due to machine crashes, communication breakdowns, process ...
Sanjeev Kumar, Philip R. Cohen
SOSP
2003
ACM
14 years 4 months ago
Improving the reliability of commodity operating systems
Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example,...
Michael M. Swift, Brian N. Bershad, Henry M. Levy
WCE
2007
13 years 8 months ago
Dynamic Traffic Regulation for WiFi Networks
— Multimedia applications require high bandwidth in order to assure certain level of Quality of Service (QoS). It is well known that the characteristics of the traffic for multim...
Domingo Marrero Marrero, Elsa María Mac&iac...
CCS
2009
ACM
14 years 2 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...