Sciweavers

1239 search results - page 8 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
14 years 2 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
HPDC
1999
IEEE
13 years 12 months ago
Techniques for Automating Distributed Real-Time Applications Design
We present a performance-based methodology for designing a high-bandwidth radar application on commodity platforms. Unlike many real-time systems, our approach works for commodity...
Dong-In Kang, Richard Gerber, Leana Golubchik, Jef...
ISSTA
2006
ACM
14 years 1 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
SIGOPS
1998
378views more  SIGOPS 1998»
13 years 7 months ago
Introducing Empirical Investigation in Undergraduate Operating Systems
Abstract: The undergraduate operating systems course can provide students with a valuable introduction to empirical testing and experimentation. This paper announces the availabili...
Steven Robbins
ICEIS
2002
IEEE
14 years 17 days ago
Integrating Mobile Agent Infrastructures in Operational ERP Systems
: In this paper we present our most recent work carried out in the wider context of the IST-ADRENALIN project, to facilitate formation and lifecycle management of networked enterpr...
Apostolos Vontas, Philippos Koutsakas, Christina A...