Sciweavers

4164 search results - page 77 / 833
» Application and desktop sharing
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
ICEIS
2003
IEEE
14 years 3 months ago
Storage of Complex Business Rules in Object Databases
: True integration of large systems requires sharing of information stored in databases beyond sharing of pure data: business rules associated with this data must be shared also. T...
Dalen Kambur, Mark Roantree
DSD
2009
IEEE
144views Hardware» more  DSD 2009»
14 years 4 months ago
Composable Resource Sharing Based on Latency-Rate Servers
Abstract—Verification of application requirements is becoming a bottleneck in system-on-chip design, as the number of applications grows. Traditionally, the verification comple...
Benny Akesson, Andreas Hansson, Kees Goossens
ICDCS
1996
IEEE
14 years 2 months ago
The Performance Value of Shared Network Caches in Clustered Multiprocessor Workstations
This paper evaluates the bene t of adding a shared cache to the network interface as a means of improving the performance of networked workstations con gured as a distributed shar...
John K. Bennett, Katherine E. Fletcher, William Ev...
FLOPS
2004
Springer
14 years 3 months ago
Backward Pair Sharing Analysis
This paper presents a backward sharing analysis for logic programs. The analysis computes pre-conditions for a query that guarantee a given post-condition is satisfied after the q...
Lunjin Lu, Andy King