Sciweavers

724 search results - page 59 / 145
» Implementing Execution Controls in Unix
Sort
View
MIDDLEWARE
2004
Springer
14 years 2 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...
HPCA
2002
IEEE
14 years 9 months ago
CableS: Thread Control and Memory Management Extensions for Shared Virtual Memory Clusters
Clusters of high-end workstations and PCs are currently used in many application domains to perform large-scale computations or as scalable servers for I/O bound tasks. Although c...
Peter Jamieson, Angelos Bilas
MICRO
2006
IEEE
105views Hardware» more  MICRO 2006»
14 years 3 months ago
Distributed Microarchitectural Protocols in the TRIPS Prototype Processor
Growing on-chip wire delays will cause many future microarchitectures to be distributed, in which hardware resources within a single processor become nodes on one or more switched...
Karthikeyan Sankaralingam, Ramadass Nagarajan, Rob...
POPL
2012
ACM
12 years 4 months ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan
ICEIS
2009
IEEE
14 years 3 months ago
MIDAS: A Middleware for Information Systems with QoS Concerns
One of the most difficult tasks in the design of information systems is how to control the behaviour of the back-end storage engine, usually a relational database. As the load on t...
Luís Fernando Orleans, Geraldo Zimbrã...