Sciweavers

214 search results - page 31 / 43
» On Turing machines, dynamical systems and the Atiyah problem
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
ICSE
2009
IEEE-ACM
14 years 2 months ago
Toward deeply adaptive societies of digital systems
Modern societies are pervaded by computerized, heterogeneous devices designed for specific purposes, but also more and more often capable of interacting with other devices for en...
Antonio Carzaniga, Giovanni Denaro, Mauro Pezz&egr...
KCAP
2003
ACM
14 years 20 days ago
Capturing interest through inference and visualization: ontological user profiling in recommender systems
Tools for filtering the World Wide Web exist, but they are hampered by the difficulty of capturing user preferences in such a diverse and dynamic environment. Recommender systems ...
Stuart E. Middleton, Nigel R. Shadbolt, David De R...
ICC
2007
IEEE
100views Communications» more  ICC 2007»
14 years 1 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
CF
2009
ACM
14 years 1 months ago
Space-and-time efficient garbage collectors for parallel systems
As multithreaded server applications and runtime systems prevail, garbage collection is becoming an essential feature to support high performance systems. The fundamental issue of...
Shaoshan Liu, Ligang Wang, Xiao-Feng Li, Jean-Luc ...