Sciweavers

9209 search results - page 1809 / 1842
» Data Space Randomization
Sort
View
CHI
1994
ACM
15 years 5 months ago
Toolglass and magic lenses: the see-through interface
ToolglassTM widgets are new user interface tools that can appear, as though on a transparent sheet of glass, between an application and a traditional cursor. They can be positione...
Eric A. Bier, Maureen C. Stone, Kenneth A. Pier, K...
VLDB
1987
ACM
90views Database» more  VLDB 1987»
15 years 5 months ago
Index Access with a Finite Buffer
: A buffer is a main-memory area used to reduce accessto disks. The buffer holds pages from secondary storage files. A processrequesting a page causesa fault if the pageis not in t...
Giovanni Maria Sacco
ASPLOS
2010
ACM
15 years 5 months ago
Orthrus: efficient software integrity protection on multi-cores
This paper proposes an efficient hardware/software system that significantly enhances software security through diversified replication on multi-cores. Recent studies show that a ...
Ruirui Huang, Daniel Y. Deng, G. Edward Suh
CCS
2009
ACM
15 years 5 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
CLUSTER
2009
IEEE
15 years 5 months ago
Using a cluster as a memory resource: A fast and large virtual memory on MPI
—The 64-bit OS provides ample memory address space that is beneficial for applications using a large amount of data. This paper proposes using a cluster as a memory resource for...
Hiroko Midorikawa, Kazuhiro Saito, Mitsuhisa Sato,...
« Prev « First page 1809 / 1842 Last » Next »