Sciweavers

419 search results - page 47 / 84
» Designing and Implementing a General Purpose Halfedge Data S...
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
ESWS
2007
Springer
14 years 1 months ago
Algorithms for Paraconsistent Reasoning with OWL
In an open, constantly changing and collaborative environment like the forthcoming Semantic Web, it is reasonable to expect that knowledge sources will contain noise and inaccuraci...
Yue Ma, Pascal Hitzler, Zuoquan Lin
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
ICIP
2001
IEEE
14 years 9 months ago
Study of embedded font context and kernel space methods for improved videotext recognition
Videotext refers to text superimposed on video frames. A videotext based Multimedia Description Scheme has recently been adopted into the MPEG-7 standard. A study of published wor...
Chitra Dorai, Hrishikesh Aradhye, Jae-Chang Shim
WORDS
2002
IEEE
14 years 18 days ago
Jini Meets Embedded Control Networking: A Case Study in Portability Failure
The Robust Self-Configuring Embedded Systems (RoSES) project seeks to achieve graceful degradation through software reconfiguration. To accomplish this goal, systems must automati...
Meredith Beveridge, Philip Koopman