Sciweavers

237 search results - page 39 / 48
» Towards engineering transparency as a requirement in socio-t...
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
IMAGING
2000
13 years 9 months ago
Color Management within a Spectral Image Visualization Tool
Recent developments in spectral imaging are pointing toward a future where the demands on color management will require a richer infrastructure than that which is currently offere...
Mitchell R. Rosen, Mark D. Fairchild, Garrett M. J...
CBSQ
2003
Springer
14 years 23 days ago
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability
The use of formal model based (FMB) methods to evaluate the quality of the components is an important research area. Except for a growing number of exceptions, FMB methods are sti...
Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon
ETFA
2006
IEEE
14 years 1 months ago
An IEC61499 Execution Environment for an aJile-based Field Device
—The IEC61499 standard is the first step towards the development of the next generation agile manufacturing systems where distribution, interoperability and re-configuration are ...
Kleanthis Thramboulidis, Nikolaos Papakonstantinou
WOSP
1998
ACM
13 years 11 months ago
Poems: end-to-end performance design of large parallel adaptive computational systems
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
Ewa Deelman, Aditya Dube, Adolfy Hoisie, Yong Luo,...