Sciweavers

492 search results - page 20 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
PVLDB
2010
115views more  PVLDB 2010»
13 years 6 months ago
ROXXI: Reviving witness dOcuments to eXplore eXtracted Information
In recent years, there has been considerable research on information extraction and constructing RDF knowledge bases. In general, the goal is to extract all relevant information f...
Shady Elbassuoni, Katja Hose, Steffen Metzger, Ral...
DATE
2006
IEEE
71views Hardware» more  DATE 2006»
14 years 1 months ago
Exploring "temperature-aware" design in low-power MPSoCs
The power density inside high performance systems continues to rise with every process technology generation, thereby increasing the operating temperature and creating “hot spot...
Giacomo Paci, Paul Marchal, Francesco Poletti, Luc...
IJES
2007
92views more  IJES 2007»
13 years 7 months ago
Exploring temperature-aware design in low-power MPSoCs
: The power density in high performance systems continues to rise with every process technology generation, thereby increasing the operating temperature and creating ‘hot spotsâ€...
Giacomo Paci, Francesco Poletti, Luca Benini, Paul...
IMC
2010
ACM
13 years 5 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu