Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Josephine Micallef"'
Autor:
Marc Pucci, Keren Bergman, Eric van den Berg, Alex Aiken, Fred Douglis, Maarten Hattink, Seth Robertson, Josephine Micallef, Mingoo Seok
Publikováno v:
IEEE Internet Computing. 25:79-87
The DARPA FastNICs program targets orders of magnitude improvement in applications such as deep learning training by making radical improvements to network performance: While raw bandwidth has grown dramatically, the fundamental roadblock to applicat
Autor:
Anthony Macera, Jonathan Pucci, Josephine Micallef, James Tanis, Seth Robertson, Scott Alexander
Publikováno v:
SASO Workshops
The topology of networks typically remains static over long periods of time, giving attackers the advantage of long planning cycles to develop, test, and refine targeted attacks. The CINDAM design preempts the attacker by creating ephemeral, per-host
Publikováno v:
MILCOM
Current malware detection and classification tools fail to adequately address variants that are generated automatically using new polymorphic and metamorphic transformation engines that can produce variants that bear no resemblance to one another. Cu
Autor:
Gail E. Kaiser, Josephine Micallef
Publikováno v:
ACM Transactions on Programming Languages and Systems. 16:1572-1612
Attribute grammars add specification of static semantic properties to context-free grammars, which, in turn, describe the syntactic structure of program units. However, context-free grammars cannot express programming-in-the-large features common in
Autor:
Gail E. Kaiser, Josephine Micallef
Publikováno v:
IEEE Transactions on Software Engineering. 19:231-252
A solution to the problem of incremental attribute evaluation for multiple asynchronous subtree replacements that is applicable to arbitrary noncircular attribute grammars is discussed. The algorithm supports multiple independent editing cursors. Con
Autor:
Josephine Micallef, R. Snyder Shane, Hira Agrawal, William Conner, James L. Alberi, Alexandr Virodov, Lisa Bahler
Publikováno v:
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
Current malware detection tools focus largely on malicious code that is injected into target programs by outsiders by exploiting inadvertent vulnerabilities such as failing to guard against a buffer overflow or failure to properly validate a user inp
Autor:
Josephine Micallef, Gail E. Kaiser
Publikováno v:
ACM SIGAda Ada Letters. :49-60
We present a model-based vision system that automatically plans the placement and optical settings of vision sensors in order to meet certain generic task requirements common to most industrial machine vision applications. From the planned viewpoints
Publikováno v:
Web Information Systems Engineering – WISE 2007 ISBN: 9783540769927
WISE
WISE
As software organizations develop systems based on service-oriented architectures (SOAs), the role of systems engineers (SEs) is crucial. They drive the process, in a top-down fashion, from the vantage point of the business domain. The SE, utilizing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fcd873ede54e9d9074d83f7ccd7376f4
https://doi.org/10.1007/978-3-540-76993-4_39
https://doi.org/10.1007/978-3-540-76993-4_39
Publikováno v:
EDOC
Market drivers to deliver software-based business solutions faster and cheaper have promoted the evolution of software system architectures toward assemblies of encapsulated components offering well-defined services - a service-oriented architecture.
Publikováno v:
ACM SIGAda Ada Letters. :29-31