Sciweavers

1059 search results - page 202 / 212
» Time-triggered implementations of dynamic controllers
Sort
View
CCS
2010
ACM
14 years 4 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
INFOCOM
2009
IEEE
14 years 4 months ago
Keep Cache Replacement Simple in Peer-Assisted VoD Systems
—Peer-assisted Video-on-Demand (VoD) systems have not only received substantial recent research attention, but also been implemented and deployed with success in large-scale real...
Jiahua Wu, Baochun Li
EICS
2009
ACM
14 years 4 months ago
Edit, inspect and connect your surroundings: a reference framework for meta-UIs
Discovering and unlocking the full potential of complex pervasive environments is still approached in application-centric ways. A set of statically deployed applications often de...
Geert Vanderhulst, Daniel Schreiber, Kris Luyten, ...
ASPLOS
2010
ACM
14 years 4 months ago
A real system evaluation of hardware atomicity for software speculation
In this paper we evaluate the atomic region compiler abstraction by incorporating it into a commercial system. We find that atomic regions are simple and intuitive to integrate i...
Naveen Neelakantam, David R. Ditzel, Craig B. Zill...
ACSAC
2008
IEEE
14 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh