Sciweavers

3686 search results - page 576 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
CODASPY
2012
12 years 3 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
JCDL
2004
ACM
97views Education» more  JCDL 2004»
14 years 1 months ago
Realistic books: a bizarre homage to an obsolete medium?
: For many readers, handling a physical book is an enjoyably exquisite part of the information seeking process. Many physical characteristics of a book—its size, heft, the patina...
Yi-Chun Chu, David Bainbridge, Matt Jones, Ian H. ...
IDTRUST
2009
ACM
14 years 2 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
OOPSLA
2009
Springer
14 years 2 months ago
A concurrent dynamic analysis framework for multicore hardware
Software has spent the bounty of Moore’s law by solving harder problems and exploiting abstractions, such as highlevel languages, virtual machine technology, binary rewritdynami...
Jungwoo Ha, Matthew Arnold, Stephen M. Blackburn, ...
IISWC
2008
IEEE
14 years 2 months ago
On the representativeness of embedded Java benchmarks
— Java has become one of the predominant languages for embedded and mobile platforms due to its architecturally neutral design, portability, and security. But Java execution in t...
Ciji Isen, Lizy Kurian John, Jung Pil Choi, Hyo Ju...