Sciweavers

1774 search results - page 325 / 355
» Modeling and implementing software architecture with acme an...
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
IUI
2004
ACM
14 years 1 months ago
Sheepdog: learning procedures for technical support
Technical support procedures are typically very complex. Users often have trouble following printed instructions describing how to perform these procedures, and these instructions...
Tessa A. Lau, Lawrence D. Bergman, Vittorio Castel...
WWW
2007
ACM
14 years 8 months ago
Providing session management as core business service
It is extremely hard for a global organization with services over multiple channels to capture a consistent and unified view of its data, services, and interactions. While SOA and...
Ismail Ari, Jun Li, Riddhiman Ghosh, Mohamed Dekhi...
SC
2003
ACM
14 years 27 days ago
Quantifying and Improving the Availability of High-Performance Cluster-Based Internet Services
Cluster-based servers can substantially increase performance when nodes cooperate to globally manage resources. However, in this paper we show that cooperation results in a substa...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...
OSDI
2008
ACM
14 years 8 months ago
Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs
Deadlock is an increasingly pressing concern as the multicore revolution forces parallel programming upon the average programmer. Existing approaches to deadlock impose onerous bu...
Manjunath Kudlur, Scott A. Mahlke, Stéphane...