Sciweavers

113 search results - page 22 / 23
» Requirements-Related Risks in Critical Systems
Sort
View
ASPLOS
2009
ACM
13 years 11 months ago
Efficient online validation with delta execution
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...
Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
TVCG
2010
151views more  TVCG 2010»
13 years 5 months ago
Uncertainty-Aware Guided Volume Segmentation
—Although direct volume rendering is established as a powerful tool for the visualization of volumetric data, efficient and reliable feature detection is still an open topic. Us...
Jörg-Stefan Praßni, Timo Ropinski, Klau...
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 1 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
WIMOB
2008
IEEE
14 years 1 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
ICCCN
2007
IEEE
14 years 1 months ago
Interplay of Security and Reliability using Non-uniform Checkpoints
Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way ...
Kiranmai Bellam, Raghava K. Vudata, Xiao Qin, Zili...