Sciweavers

1036 search results - page 56 / 208
» Utilizing Validation Experience for System Validation
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
COOPIS
2003
IEEE
14 years 1 months ago
Ontology Based Query Processing in Database Management Systems
The use of semantic knowledge in its various forms has become an important aspect in managing data in database and information systems. In the form of integrity constraints, it ha...
Chokri Ben Necib, Johann Christoph Freytag
CORR
2010
Springer
113views Education» more  CORR 2010»
13 years 8 months ago
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wireless Access Systems
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that satisfies both throughput and delay guarantee to various real and non-real time app...
Prasun Chowdhury, Iti Saha Misra
IPPS
2008
IEEE
14 years 2 months ago
SLA-based resource allocation in cluster computing systems
Resource allocation is a fundamental but challenging problem due to the complexity of cluster computing systems. In enterprise service computing, resource allocation is often asso...
Kaiqi Xiong, Harry G. Perros
EUC
2007
Springer
14 years 2 months ago
Consensus-Driven Distributable Thread Scheduling in Networked Embedded Systems
We demonstrate an improved consensus-driven utility accrual scheduling algorithm (DUA-CLA) for distributable threads which execute under run-time uncertainties in execution time, ...
Jonathan Stephen Anderson, Binoy Ravindran, E. Dou...