نتایج جستجو برای: run time leakage

تعداد نتایج: 1977427  

Journal: :Journal of Systems Architecture 2016

Journal: :Service Oriented Computing and Applications 2017

Journal: :Journal of Systems Architecture 2012

Journal: :Journal of Artificial Intelligence Research 2022

We present a system for online, incremental composite event recognition. In streaming environments, the usual case is data to arrive with (variable) delay from, and be revised by, underlying sources. propose RTECinc, an version of RTEC, recognition engine formal, declarative semantics, that has been shown scale several real-world streams. RTEC deals delayed arrival revision events by computing ...

1997
Huw Evans Peter Dickman

Modern systems must be adaptable | to changing requirements, bug-xes, new technologies and reconnguration. For critical applications this must be possible at run-time; for complex applications it should be limitable to major subdivisions of the system. The DRASTIC architecture addresses these goals by exploiting object persistence and distributed systems implementation techniques. It enables ru...

2015
Christopher Landauer Kirstie L. Bellman

Models are essential for defining and developing systems that support run-time decision-making and reconfiguration, and for implementing autonomous and adaptive systems for remote, hazardous, and largely unknown external environments. We show that they can also be used as the operational code throughout the development process, including deployment. Our ability to build systems with this proper...

2009
Tudor Dumitras Frank Eliassen Kurt Geihs Henry Muccini Andrea Polini Theo Ungerer

Computer systems undergoing runtime evolution, such as online software-upgrades or architectural reconfigurations, must cope with changes that happen during the system execution and that might be unpredictable at design-time. The evolution requires a sequence of transition phases, where the system enters configurations emerging at runtime that could not have been validated in advance. Reasoning...

2013
Fakhar Anjam

To my father and all other members of my family Summary In this dissertation, we propose to combine programmability with reconfig-urability by implementing an adaptable programmable VLIW processor in a reconfigurable hardware. The approach allows applications to be developed at high-level (C language level), while at the same time, the processor organization can be adapted to the specific requi...

2012
Chaya Ganesh Vipul Goyal Satyanarayana V. Lokam

We study the question of designing leakage-resilient secure computation protocols. Our model is that of only computation leaks information with a leak-free input encoding phase. In more detail, we assume an offline phase called the input encoding phase in which each party encodes its input in a specified format. This phase is assumed to be free of any leakage and may or may not depend upon the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید