Results 1 - 10
of
3,128
Book Title
"... IOS Press, 2003 An adaptive neural controller for a tendon driven robotic hand ..."
Abstract
- Add to MetaCart
IOS Press, 2003 An adaptive neural controller for a tendon driven robotic hand
Book Title
"... Our goal is to utilize living microorganisms as smart, autonomous microrobots. ..."
Abstract
- Add to MetaCart
Our goal is to utilize living microorganisms as smart, autonomous microrobots.
Books Title
, 2008
"... � Locating and understanding data sources – Creating mappings and mediated schemas – Pay-as-you-go: improving with time – Querying dataspaces • Research challenges on specific dataspaces: ..."
Abstract
- Add to MetaCart
� Locating and understanding data sources – Creating mappings and mediated schemas – Pay-as-you-go: improving with time – Querying dataspaces • Research challenges on specific dataspaces:
Book Title
, 2003
"... Cognitive map plasticity and imitation strategies to extend the performance of a MAS ..."
Abstract
- Add to MetaCart
Cognitive map plasticity and imitation strategies to extend the performance of a MAS
Book Title Book Editors
"... Combining sceptical epistemic reasoning with credulous practical reasoning (corrected version) 1 ..."
Abstract
- Add to MetaCart
Combining sceptical epistemic reasoning with credulous practical reasoning (corrected version) 1
Book Title Book Editors
"... Abstract. Existing approaches to software security and reliability have proven inadequate in offering a good tradeoff between the assurance, reliability, availability, and performance. We argue that reactive protection mechanisms need to be added to our panoply of defenses. Furthermore, we argue tha ..."
Abstract
- Add to MetaCart
Abstract. Existing approaches to software security and reliability have proven inadequate in offering a good tradeoff between the assurance, reliability, availability, and performance. We argue that reactive protection mechanisms need to be added to our panoply of defenses. Furthermore, we argue that such mechanisms need to be much more invasive than previously envisioned. We discuss our approach to such mechanisms by introducing the concept of self-healing software. We describe the principles behind self-healing software systems and showcase the concepts by giving an overview the Worm Vaccine architecture. Keywords. Self-healing Software, Reactive Systems, OODA Feedback Loop Despite considerable work in fault tolerance and reliability, software remains notoriously buggy and crash-prone. The current approach to ensuring the security and availability of software consists of a mix of different techniques: • Proactive techniques seek to make the code as dependable as possible, through a combination of safe languages (e.g., Java [8]), libraries [1] and compilers [9,14], code analysis tools and formal methods [3,7,25], and development methodologies.
Results 1 - 10
of
3,128