Sciweavers

128 search results - page 15 / 26
» Reactive Objects
Sort
View
ECBS
2005
IEEE
179views Hardware» more  ECBS 2005»
14 years 1 months ago
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight...
Derek Messie, Mina Jung, Jae C. Oh, Shweta Shetty,...
TOOLS
1997
IEEE
13 years 12 months ago
Propagator: A Family of Patterns
PROPAGATOR is a family of patterns for consistently updating objects in a dependency network. The propagator patterns are found in such diverse applications as MAKE, WWW, spreadsh...
Peter H. Feiler, Walter F. Tichy
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 2 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
DANCE
2002
IEEE
14 years 19 days ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
IFIP
1999
Springer
13 years 12 months ago
Management and optimization of multiple supply chains
Supply Chain Management (SCM) plans and controls the production over a group of autonomous enterprises. Process-oriented design is used to eliminate inefficiencies of the chain on...
J. Dorn