Sciweavers

159 search results - page 8 / 32
» Making the Most of IT Governance Software: Understanding Imp...
Sort
View
USS
2008
13 years 11 months ago
Helios: Web-based Open-Audit Voting
Voting with cryptographic auditing, sometimes called open-audit voting, has remained, for the most part, a theoretical endeavor. In spite of dozens of fascinating protocols and re...
Ben Adida
EUROSYS
2007
ACM
14 years 5 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...
FASE
2006
Springer
14 years 9 days ago
: Designing a Scalable Build Process
Modern software codebases are frequently large, heterogeneous, and constantly evolving. The languages and tools for software construction, including code builds and configuration m...
Jason Hickey, Aleksey Nogin
ISESE
2005
IEEE
14 years 2 months ago
A comparative study on the re-documentation of existing software: code annotations vs. drawing editors
During software evolution, programmers spend a lot of time and effort in the comprehension of the internal code structure. Such an activity is often required because the available...
Marco Torchiano, Filippo Ricca, Paolo Tonella
ACMMSP
2006
ACM
252views Hardware» more  ACMMSP 2006»
14 years 2 months ago
Deconstructing process isolation
Most operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping, and differentiated user and kernel instructions....
Mark Aiken, Manuel Fähndrich, Chris Hawblitze...