Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
— This paper presents a software component, the plan database, which provides the needed services to define plans, execute them and more importantly adapt them during execution....
Software distributed shared memory (DSM) improves the programmability of message-passing machines and workclusters by providing a shared memory abstract (i.e., a coherent global a...
The ability for software products to adapt to future changes is essential. Whether the change, the delta, is prefixed to subclasses or postfixed to super classes, class hierarchie...
Software systems are becoming more open, distributed, pervasive, and connected. In such systems, the relationships between loosely-coupled application elements become non-determini...