Sciweavers

336 search results - page 26 / 68
» Using AOP to develop architectural-neutral operating system ...
Sort
View
DBSEC
2001
129views Database» more  DBSEC 2001»
13 years 9 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
JVM
2004
165views Education» more  JVM 2004»
13 years 9 months ago
Using Hardware Performance Monitors to Understand the Behavior of Java Applications
Modern Java programs, such as middleware and application servers, include many complex software components. Improving the performance of these Java applications requires a better ...
Peter F. Sweeney, Matthias Hauswirth, Brendon Caho...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
14 years 2 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
CSREAESA
2009
13 years 9 months ago
Application of Embedded Systems in Low Earth Orbit for Measurement of Ionospheric Anomalies
: Space is a hazardous environment for both man and machine and to explore such a terrain a rugged, yet easily implementable, platform is needed. Low-cost, low-power embedded syste...
George J. Starr, J. M. Wersinger, Richard Chapman,...
CODES
1997
IEEE
14 years 2 days ago
Optimizing communication in embedded system co-simulation
The Pia hardware-software co-simulator provides substantial speedups over traditional co-simulation methods by permitting dynamic changes in the level of detail when simulating co...
Ken Hines, Gaetano Borriello