Sciweavers

338 search results - page 42 / 68
» The design and implementation of formal monitoring technique...
Sort
View
TCS
2010
13 years 6 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
ACSAC
2008
IEEE
14 years 2 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
ICPP
2007
IEEE
14 years 2 months ago
Mercury: Combining Performance with Dependability Using Self-virtualization
There has recently been increasing interests in using system virtualization to improve the dependability of HPC cluster systems. However, it is not cost-free and may come with som...
Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, ...
ENGL
2007
141views more  ENGL 2007»
13 years 7 months ago
A Novel Multi-Agent Controller for Dynamic Systems based on Supervisory Loop Approach
— This paper presents a new intelligent agent supervisory loop based approach for dynamic system control. The scheme consists of three software agents that work in an autonomous ...
Sukumar Kamalasadan
GIS
2010
ACM
13 years 5 months ago
Efficient indexing structure for scalable processing of spatial alarms
Spatial Alarms are reminders for mobile users upon their arrival of certain spatial location of interest. Spatial alarm processing requires meeting two demanding objectives: high ...
Myungcheol Doo, Ling Liu, Nitya Narasimhan, Venu V...