Sciweavers

536 search results - page 79 / 108
» Deconstructing process isolation
Sort
View
ACSAC
1998
IEEE
14 years 28 days ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
INFOCOM
1998
IEEE
14 years 27 days ago
A Priority Scheme for the IEEE 802.14 MAC Protocol for Hybrid Fiber-Coax Networks
In order to support quality-of-service (QoS) for real-time data communications such as voice, video and interactive services, multiaccess networks must provide an effective priorit...
Mark D. Corner, Nada Golmie, Jörg Liebeherr, ...
COSIT
1997
Springer
98views GIS» more  COSIT 1997»
14 years 24 days ago
Structuring Space with Image Schemata: Wayfinding in Airports as a Case Study
Wayfinding is a basic activity people do throughout their entire lives as they navigate from one place to another. In order to create different spaces in such a way that they facil...
Martin Raubal, Max J. Egenhofer, Dieter Pfoser, Ne...
JSSPP
1997
Springer
14 years 24 days ago
An Experimental Evaluation of Processor Pool-Based Scheduling for Shared-Memory NUMA Multiprocessors
In this paper we describe the design, implementation and experimental evaluation of a technique for operating system schedulers called processor pool-based scheduling [51]. Our tec...
Tim Brecht
WCRE
1993
IEEE
14 years 23 days ago
Flexible Control for Program Recognition
Recognizing commonly used data structures and algorithms is a key activity in reverse engineering. Systems developed to automate this recognition process have been isolated, stand...
Linda M. Wills