Sciweavers

60 search results - page 2 / 12
» Microsoft windows programming strategies
Sort
View
IFIP
2005
Springer
14 years 12 days ago
Recovering Digital Evidence from Linux Systems
As Linux kernel-based operating systems gain market share there will be an inevitable increase in Linux systems that law enforcement agents must process at cybercrime scenes. The ...
Philip Craiger
ISCA
1998
IEEE
119views Hardware» more  ISCA 1998»
13 years 11 months ago
Execution Characteristics of Desktop Applications on Windows NT
This paper examines the performance of desktop applications running on the Microsoft Windows NT operating system on Intel x86 processors, and contrasts these applications to the p...
Dennis C. Lee, Patrick Crowley, Jean-Loup Baer, Th...
USS
2004
13 years 8 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
ACSAC
1999
IEEE
13 years 11 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
JOT
2006
82views more  JOT 2006»
13 years 6 months ago
The Initium RJS Screensaver: Part 1, MS Windows
This paper describes a Java-based screensaver technology for the Initium Remote Job Submission (RJS) system running on Microsoft Windows. Initium RJS is a Java Web Start (JAWS) te...
Douglas A. Lyon