نتایج جستجو برای: run time leakage
تعداد نتایج: 1977427 فیلتر نتایج به سال:
We present a system for online, incremental composite event recognition. In streaming environments, the usual case is data to arrive with (variable) delay from, and be revised by, underlying sources. propose RTECinc, an version of RTEC, recognition engine formal, declarative semantics, that has been shown scale several real-world streams. RTEC deals delayed arrival revision events by computing ...
Modern systems must be adaptable | to changing requirements, bug-xes, new technologies and reconnguration. For critical applications this must be possible at run-time; for complex applications it should be limitable to major subdivisions of the system. The DRASTIC architecture addresses these goals by exploiting object persistence and distributed systems implementation techniques. It enables ru...
Models are essential for defining and developing systems that support run-time decision-making and reconfiguration, and for implementing autonomous and adaptive systems for remote, hazardous, and largely unknown external environments. We show that they can also be used as the operational code throughout the development process, including deployment. Our ability to build systems with this proper...
Computer systems undergoing runtime evolution, such as online software-upgrades or architectural reconfigurations, must cope with changes that happen during the system execution and that might be unpredictable at design-time. The evolution requires a sequence of transition phases, where the system enters configurations emerging at runtime that could not have been validated in advance. Reasoning...
To my father and all other members of my family Summary In this dissertation, we propose to combine programmability with reconfig-urability by implementing an adaptable programmable VLIW processor in a reconfigurable hardware. The approach allows applications to be developed at high-level (C language level), while at the same time, the processor organization can be adapted to the specific requi...
We study the question of designing leakage-resilient secure computation protocols. Our model is that of only computation leaks information with a leak-free input encoding phase. In more detail, we assume an offline phase called the input encoding phase in which each party encodes its input in a specified format. This phase is assumed to be free of any leakage and may or may not depend upon the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید