Sciweavers

CLUSTER
2006
IEEE
13 years 11 months ago
Retrofitting Autonomic Capabilities onto Legacy Systems
Autonomic computing
Janak J. Parekh, Gail E. Kaiser, Philip Gross, Giu...
MABS
2000
Springer
14 years 3 months ago
The Use of Models - Making MABS More Informative
g of target systems attempted but rather an abstraction of the target systems is modelled and insights bout the abstraction then applied back to the target systems. The MABS modell...
Bruce Edmonds
ICECCS
1997
IEEE
99views Hardware» more  ICECCS 1997»
14 years 3 months ago
The Butterfly Methodology : A Gateway-free Approach for Migrating Legacy Information Systems
The problems posed by mission-critical legacy systems - e.g., brittleness, inflexibility, isolation, non-extensibility, lack of openness - are well known, but practical solutions ...
Bing Wu, Deirdre Lawless, Jesus Bisbal, Ray Richar...
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 5 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
CCS
2007
ACM
14 years 5 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
IJCNN
2007
IEEE
14 years 5 months ago
Self-Organizing Maps as Traveling Computational Templates
In this article we approach neural networks as computational templates that travel across various sciences. Traditionally, it has been thought that models are primarily models of s...
Tarja Knuuttila, Anna-Mari Rusanen, Timo Honkela