Sciweavers

987 search results - page 114 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
ISLPED
2010
ACM
205views Hardware» more  ISLPED 2010»
13 years 9 months ago
Peak power modeling for data center servers with switched-mode power supplies
Accurately modeling server power consumption is critical in designing data center power provisioning infrastructure. However, to date, most research proposals have used average CP...
David Meisner, Thomas F. Wenisch
ETS
2002
IEEE
139views Hardware» more  ETS 2002»
13 years 8 months ago
Automated Tutorial and Assignment Assessment
Computer simulation is used extensively both as an educational tool and within industry. It can be employed as a means of developing a new process or system or as a means of exper...
Roger F. Browne
ICSE
2000
IEEE-ACM
14 years 16 days ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
QNS
1996
13 years 10 months ago
Real Inferno
Inferno is an operating system well suited to applications that need to be portable, graphical, and networked. This paper describes the fundamental oating point facilities of the...
Eric Grosse
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 1 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...