Sciweavers

6348 search results - page 994 / 1270
» Extensible control architectures
Sort
View
ICWS
2010
IEEE
15 years 5 months ago
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality
Abstract--Most work on adaptive workflows offers insufficient flexibility to enforce complex policies regarding dynamic, evolvable and robust workflows. In addition, many proposed ...
Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wo...
109
Voted
ICISC
2007
99views Cryptology» more  ICISC 2007»
15 years 5 months ago
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
VMM (virtual machine monitor) based system provides the useful inspection and interposition of guest OS. With proper modification of guest OS, we can obtain event-driven memory sn...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
SIMUTOOLS
2008
15 years 5 months ago
Simulating wireless and mobile networks in OMNeT++ the MiXiM vision
Wireless communication has attracted considerable interest in the research community, and many wireless networks are evaluated using discrete event simulators like OMNeT++. Althou...
A. Köpke, M. Swigulski, K. Wessel, D. Willkom...
NETWORKING
2007
15 years 5 months ago
Improving XCP to Achieve Max-Min Fair Bandwidth Allocation
TCP is shown to be inefficient and instable in high speed and long latency networks. The eXplicit Control Protocol (XCP) is a new and promising protocol that outperforms TCP in ter...
Lei Zan, Xiaowei Yang
AVI
2004
15 years 5 months ago
Visualizing programs with Jeliot 3
We present a program visualization tool called Jeliot 3 that is designed to aid novice students to learn procedural and object oriented programming. The key feature of Jeliot is t...
Andrés Moreno, Niko Myller, Erkki Sutinen, ...