Sciweavers

1963 search results - page 312 / 393
» How is aliasing used in systems software
Sort
View
IJMI
2010
149views more  IJMI 2010»
13 years 7 months ago
Analysis of communicative behaviour: Profiling roles and activities
In this paper, we discuss how profiles of communicative behaviour can be used to present and analyse information about role activity recorded through structured observation of spec...
Inger Dybdahl Sørby, Øystein Nytr&os...
ICDCN
2012
Springer
12 years 4 months ago
Lifting the Barriers - Reducing Latencies with Transparent Transactional Memory
Synchronization in distributed systems is expensive because, in general, threads must stall to obtain a lock or to operate on volatile data. Transactional memory, on the other hand...
Annette Bieniusa, Thomas Fuhrmann
ISSRE
2010
IEEE
13 years 7 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
CCS
2007
ACM
14 years 3 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
GD
2008
Springer
13 years 10 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...