Sciweavers

536 search results - page 9 / 108
» Deconstructing process isolation
Sort
View
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
14 years 1 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
14 years 2 months ago
Isolating the benefits of respect
The three mechanisms of crossover are transmission, assortment, and respect. Of these three mechanisms, assortment (i.e. recombination) is traditionally viewed as the primary feat...
Stephen Chen, Gregory Pitt
IFIP
2004
Springer
14 years 1 months ago
Isolated Word Recognition for English Language Using LPC, VQ and HMM
: Speech recognition is always looked upon as a fascinating field in human computer interaction. It is one of the fundamental steps towards understanding human cognition and their ...
Mayukh Bhaowal, Kunal Chawla
IEEEPACT
2003
IEEE
14 years 1 months ago
Reducing Datapath Energy through the Isolation of Short-Lived Operands
We present a technique for reducing the power dissipation in the course of writebacks and committments in a datapath that uses a dedicated architectural register file (ARF) to hol...
Dmitry Ponomarev, Gurhan Kucuk, Oguz Ergin, Kanad ...
SASO
2007
IEEE
14 years 2 months ago
Root Cause Isolation for Self Healing in J2EE Environments
— The increasing complexity of distributed enterprise systems has made the task of managing these systems difficult and time consuming. The only way to simplify the management p...
Umesh Bellur, Amar Agrawal