Sciweavers

196 search results - page 7 / 40
» On Isolating Points Using Disks
Sort
View
CCS
2010
ACM
13 years 6 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
RC
2002
103views more  RC 2002»
13 years 7 months ago
Exact Minkowski Products of N Complex Disks
An exact parameterization for the boundary of the Minkowski product of N circular disks in the complex plane is derived. When N > 2, this boundary curve may be regarded as a gen...
Rida T. Farouki, Helmut Pottmann
VISUALIZATION
2000
IEEE
13 years 12 months ago
A flow-guided streamline seeding strategy
This paper presents a seed placement strategy for streamlines based on flow features in the dataset. The primary goal of our seeding strategy is to capture flow patterns in the ...
Vivek Verma, David T. Kao, Alex Pang
ISCA
2006
IEEE
133views Hardware» more  ISCA 2006»
14 years 1 months ago
TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged by...
Qing Yang, Weijun Xiao, Jin Ren
VEE
2010
ACM
204views Virtualization» more  VEE 2010»
13 years 7 months ago
Energy-efficient storage in virtual machine environments
Current trends in increasing storage capacity and virtualization of resources combined with the need for energy efficiency put a challenging task in front of system designers. Pre...
Lei Ye, Gen Lu, Sushanth Kumar, Chris Gniady, John...