Sciweavers

164 search results - page 32 / 33
» On the Incoherencies in Web Browser Access Control Policies
Sort
View
DAGSTUHL
2007
13 years 8 months ago
Ubiquitous Nature of Event-Driven Approaches: A Retrospective View
This paper retrospectively analyzes the progress of event-based capability and their applicability in various domains. Although research on event-based approaches started in a hum...
Sharma Chakravarthy, Raman Adaikkalavan
SOSP
2009
ACM
14 years 4 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
EUROSYS
2007
ACM
14 years 4 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...
ISW
2004
Springer
14 years 22 days ago
A Distributed High Assurance Reference Monitor
Abstract Ajay Chander1 , Drew Dean2 , and John Mitchell3 1 DoCoMo Communications Laboratories USA, San Jose, CA 95110 2 Computer Science Laboratory, SRI International, Menlo Park, ...
Ajay Chander, Drew Dean, John C. Mitchell
DL
1998
Springer
180views Digital Library» more  DL 1998»
13 years 11 months ago
Automatic Subject Indexing Using an Associative Neural Network
The global growth in popularity of the World Wide Web has been enabled in part by the availability of browser based search tools which in turn have led to an increased demand for ...
Yi-Ming Chung, William M. Pottenger, Bruce R. Scha...