Sciweavers

3341 search results - page 463 / 669
» A Communication Virtual Machine
Sort
View
USS
2008
15 years 5 months ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel
ECOOP
2008
Springer
15 years 4 months ago
Online Phase-Adaptive Data Layout Selection
Good data layouts improve cache and TLB performance of object-oriented software, but unfortunately, selecting an optimal data layout a priori is NP-hard. This paper introduces layo...
Chengliang Zhang, Martin Hirzel
124
Voted
ESORICS
2008
Springer
15 years 4 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
89
Voted
DAGSTUHL
2010
15 years 4 months ago
Pre-operative Planning and Intra-operative Guidance for Shoulder Replacement Surgery
Shoulder joint replacement, or arthroplasty, is indicated in cases where arthritis or trauma has resulted in severe joint damage that in turn causes increased pain and decreased f...
Charl P. Botha, Peter R. Krekel, Edward R. Valstar...
109
Voted
CIDR
2007
156views Algorithms» more  CIDR 2007»
15 years 4 months ago
SwissQM: Next Generation Data Processing in Sensor Networks
Sensor networks are becoming an important part of the IT landscape. Existing systems, however, are limited in two fundamental ways: lack of data independence, and poor integration...
René Müller, Gustavo Alonso, Donald Ko...