Sciweavers

804 search results - page 110 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ISPAN
2000
IEEE
15 years 9 months ago
User Level Communication on Alpha Linux Systems
Recent advances in commodity network interface technology enable scientists and engineers to build clusters of workstations or PCs to execute parallel applications. However, raw-h...
Jie Chen, William A. Watson III
POPL
2000
ACM
15 years 8 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
ASAP
1997
IEEE
93views Hardware» more  ASAP 1997»
15 years 8 months ago
A Novel Sequencer Hardware for Application Specific Computing
This paper introduces a powerful novel sequencer for controlling computational machines and for structured DMA (direct memory access) applications. It is mainly focused on applica...
Reiner W. Hartenstein, Jürgen Becker, Michael...
CHI
1996
ACM
15 years 8 months ago
Workspace Awareness Support with Radar Views
Real-time groupware systems often let each participant control their own view into a shared workspace. This strategy can reduce awareness about where and how others are interactin...
Carl Gutwin, Saul Greenberg, Mark Roseman
VLDB
1990
ACM
126views Database» more  VLDB 1990»
15 years 8 months ago
Consistency of Versions in Object-Oriented Databases
This paper presents an approach to maintaining consistency of object versions in multiversion database systems. In this approach a multiversion database is considered to be a set ...
Wojciech Cellary, Geneviève Jomier