Migrating data from legacy storage systems to object storage systems

V Pandey, C Sharma, R Kumar, P Deshmukh… - US Patent …, 2015 - Google Patents
One or more techniques and/or systems are provided for migrating a dataset from a file
storage system to an object storage system. That is, a Snapshot of a file system may be …

Toward a symbiotic expert system for econometric modeling

DR Dolk, DJ Kridel - Proceedings of the Twenty-Second Annual …, 1989 - computer.org
An examination is made of the feasibility of developing an artificially intelligent
econometrician as a symbiotic decision support system (SDSS). The authors review the …

Fast embedded A/D converter testing using the microcontroller's resources

R Bobba, B Stevens - Proceedings. International Test …, 1990 - ieeexplore.ieee.org
It is shown that embedded analog-to-digital (A/D) converters in microcontrollers can be
tested more thoroughly and more quickly on digital VLSI test systems by using the …

Cost-benefit analysis of kernel tracing systems for forensic readiness

YC Liao, H Langweg - Proceedings of the 2nd international workshop on …, 2014 - dl.acm.org
We present a cost-benefit analysis of kernel tracing systems for forensic readiness. We use
the comprehensive coverage provided by kernel tracing systems as the indicator of benefit …

Towards an open dependable operating system

Y Ishikawa, H Fujita, T Maeda… - … -Oriented Real-Time …, 2009 - ieeexplore.ieee.org
This paper introduces a new dependable operating system project, called DEOS, started in
2006, and scheduled to continue for six years. In this project, a safety extension mechanism …

Trustable web services with dynamic confidence time interval

N Srirajun, P Bhatarakosol… - … Conference on New …, 2010 - ieeexplore.ieee.org
One part of trustfulness on web services application over the network is confidence of
services that providers can guarantee to their customers. Therefore, after the development …

A trustable software with a dynamic loop control mechanism

N Srirajun, P Bhattarakosol… - International …, 2012 - inderscienceonline.com
Unexpected infinite loop during software deployment period is an undesirable for every
organisation since it can cause critical damages in various aspects. Most of the current …

Detecting anomalies in embedded computing systems via a novel hmm-based machine learning approach

A Cuzzocrea, E Medvet, E Mumolo… - Hybrid Artificial Intelligent …, 2015 - Springer
Computing systems are vulnerable to anomalies that might occur during execution of
deployed software: eg, faults, bugs or deadlocks. When occurring on embedded computing …

Multi-layered Adaptive Monitoring in Service Robots

H Kim, H Yoon, Y Cho, S Park… - 2011 Fifth International …, 2011 - ieeexplore.ieee.org
Service failure in a service robot is an event that occurs when the delivered service deviates
from the correct original service specified by the developers. The cause of failures is due to …

소프트웨어오류탐지를위한아키텍처기반의다계층적자가적응형모니터링방법

윤현지, 박수용 - 정보과학회논문지: 소프트웨어및응용, 2010 - dbpia.co.kr
요 약 Mission-critical 시스템의 경우 자가 치유는 신뢰성을 보장하기 위한 기술 중 하나이다.
자가치유는 오류 탐지와 오류 회복으로 이루어져 있으며 오류 탐지는 오류 회복을 가능하게 …