Sciweavers

492 search results - page 57 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
CCS
2008
ACM
13 years 10 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
COORDINATION
2004
Springer
14 years 1 months ago
Optimistic Concurrency Semantics for Transactions in Coordination Languages
There has been significant recent interest in exploring the role of coordination languages as middleware for distributed systems. These languages provide operations that allow pro...
Suresh Jagannathan, Jan Vitek
ER
2004
Springer
104views Database» more  ER 2004»
14 years 1 months ago
Incremental Navigation: Providing Simple and Generic Access to Heterogeneous Structures
Abstract. We present an approach to support incremental navigation of structured information, where the structure is introduced by the data model and schema (if present) of a data ...
Shawn Bowers, Lois M. L. Delcambre
ICSE
2003
IEEE-ACM
14 years 8 months ago
Embedded Architect: A Tool for Early Performance Evaluation of Embedded Software
Embedded Architect is a design automation tool that embodies a static performance evaluation technique to support early, architecture-level design space exploration for component-...
Jeffry T. Russell, Margarida F. Jacome
IM
2003
13 years 9 months ago
Enabling PreOS Desktop Management
: Desktop management is probably the most resource-consuming task for the typical operations and support team, regardless of being frequently overlooked as not as complex or specia...
Tiago Cruz, Paulo Simões