Sciweavers

536 search results - page 77 / 108
» Deconstructing process isolation
Sort
View
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
14 years 2 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
ICRA
2003
IEEE
117views Robotics» more  ICRA 2003»
14 years 1 months ago
Map building with mobile robots in dynamic environments
The problem of generating maps with mobile robots has received considerable attention over the past years. Most of the techniques developed so far have been designed for situation...
Dirk Hähnel, Rudolph Triebel, Wolfram Burgard...
PLDI
2003
ACM
14 years 1 months ago
Taming the IXP network processor
We compile Nova, a new language designed for writing network processing applications, using a back end based on integer-linear programming (ILP) for register allocation, optimal b...
Lal George, Matthias Blume
ACSAC
2002
IEEE
14 years 1 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
SIGMOD
2010
ACM
168views Database» more  SIGMOD 2010»
14 years 1 months ago
SimDB: a similarity-aware database system
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Ahmed M. Aly, Walid G. Aref, Per-&...