Sciweavers

211 search results - page 17 / 43
» A Compositional Multiple Policies Operating System Security ...
Sort
View
TODAES
2008
158views more  TODAES 2008»
13 years 8 months ago
Designing secure systems on reconfigurable hardware
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deployment of custom hardware. Embedded systems based on reconfigurable hardware integ...
Ted Huffmire, Brett Brotherton, Nick Callegari, Jo...
PERVASIVE
2006
Springer
13 years 8 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz
IEAAIE
2007
Springer
14 years 2 months ago
Intelligent OS Process Scheduling Using Fuzzy Inference with User Models
The process scheduling aims to arrange CPU time to multiple processes for providing users with more efficient throughput. Except the class of process set by user, conventional oper...
Sungsoo Lim, Sung-Bae Cho
OOPSLA
2009
Springer
14 years 3 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...
EDOC
2007
IEEE
14 years 3 months ago
On Interoperability and Conformance Assessment in Service Composition
The process of composing a service from other services typically involves multiple models. These models may represent the service from distinct perspectives, e.g., to model the di...
Dick A. C. Quartel, Marten van Sinderen