Sciweavers

1963 search results - page 272 / 393
» How is aliasing used in systems software
Sort
View
PREMI
2005
Springer
14 years 2 months ago
Systematically Evolving Configuration Parameters for Computational Intelligence Methods
The configuration of a computational intelligence (CI) method is responsible for its intelligence (e.g. tolerance, flexibility) as well as its accuracy. In this paper, we investiga...
Jason M. Proctor, Rosina Weber
ESORICS
2008
Springer
13 years 11 months ago
CPU Bugs, CPU Backdoors and Consequences on Security
In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
Loïc Duflot
EDM
2010
153views Data Mining» more  EDM 2010»
13 years 10 months ago
An Analysis of the Differences in the Frequency of Students' Disengagement in Urban, Rural, and Suburban High Schools
We study how student behaviors associated with disengagement differ between different school settings. Towards this, we investigate the variation in the frequency of off-task behav...
Ryan Shaun Joazeiro de Baker, Sujith M. Gowda
ECEASST
2008
75views more  ECEASST 2008»
13 years 9 months ago
Extended OCL for Goal Monitoring
Monitoring human-computer interaction aids the analysis for understanding how well software meets its purpose. In particular, monitoring human-computer interactions with respect to...
William N. Robinson
COMCOM
2007
123views more  COMCOM 2007»
13 years 9 months ago
Seamless transport service selection by deploying a middleware
Despite the many research efforts at the transport layer (SCTP, DCCP, etc.), new innovations in that area hardly ever make it into the TCP/IP stacks of standard end systems. We b...
Sven Hessler, Michael Welzl