Sciweavers

3667 search results - page 514 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
151
Voted
ISSRE
2008
IEEE
15 years 10 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
AH
2008
Springer
15 years 10 months ago
Proactive Versus Multimodal Online Help: An Empirical Study
Two groups of 8 participants experimented two enhancements of standard online help for the general public during one hour: adaptive proactive (AP) assistance and multimodal user su...
Jérôme Simonin, Noëlle Carbonell
145
Voted
ASWEC
2007
IEEE
15 years 10 months ago
A Configurable Event Correlation Architecture for Adaptive J2EE Applications
Distributed applications that adapt as their environment changes are developed from selfmanaging, self-configuring and self-optimising behaviours. This requires constant monitorin...
Yan Liu, Ian Gorton, Vinh Khanh Le
CGO
2007
IEEE
15 years 10 months ago
Code Compaction of an Operating System Kernel
General-purpose operating systems, such as Linux, are increasingly being used in embedded systems. Computational resources are usually limited, and embedded processors often have ...
Haifeng He, John Trimble, Somu Perianayagam, Saumy...
127
Voted
CODES
2007
IEEE
15 years 10 months ago
Secure FPGA circuits using controlled placement and routing
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...
Pengyuan Yu, Patrick Schaumont