Sciweavers

213 search results - page 30 / 43
» The Value of Observation for Monitoring Dynamic Systems
Sort
View
ASPLOS
2010
ACM
14 years 3 months ago
Power routing: dynamic power provisioning in the data center
Data center power infrastructure incurs massive capital costs, which typically exceed energy costs over the life of the facility. To squeeze maximum value from the infrastructure,...
Steven Pelley, David Meisner, Pooya Zandevakili, T...
ACSAC
2008
IEEE
14 years 3 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 2 months ago
Optimal Scheduling Policy Determination for High Speed Downlink Packet Access
— In this paper, we present an analytic model and methodology to determine optimal scheduling policy that involves two dimension space allocation: time and code, in High Speed Do...
Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadar...
CSDA
2011
13 years 3 months ago
Approximate forward-backward algorithm for a switching linear Gaussian model
Motivated by the application of seismic inversion in the petroleum industry we consider a hidden Markov model with two hidden layers. The bottom layer is a Markov chain and given ...
Hugo Hammer, Håkon Tjelmeland
ICSE
2010
IEEE-ACM
13 years 10 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...