Sciweavers

536 search results - page 80 / 108
» Deconstructing process isolation
Sort
View
SIGCOMM
1995
ACM
14 years 5 days ago
Performance Bounds in Communication Networks with Variable-Rate Links
In most network models for quality of service support, the communication links interconnecting the switches and gateways are assumed to have fixed bandwidth and zero error rate. T...
Kam Lee
USS
2008
13 years 11 months ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel
ASPDAC
2008
ACM
106views Hardware» more  ASPDAC 2008»
13 years 10 months ago
Hierarchical Krylov subspace reduced order modeling of large RLC circuits
In this paper, we propose a new model order reduction approach for large interconnect circuits using hierarchical decomposition and Krylov subspace projection-based model order re...
Duo Li, Sheldon X.-D. Tan
CCS
2008
ACM
13 years 10 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
ERCIMDL
2008
Springer
126views Education» more  ERCIMDL 2008»
13 years 10 months ago
An Extensible Virtual Digital Libraries Generator
In this paper we describe the design and implementation of the VDL Generator, a tool to simplify and automatise the Digital Library development process. In particular, we discuss h...
Massimiliano Assante, Leonardo Candela, Donatella ...