Sciweavers

882 search results - page 170 / 177
» On the Negotiation of Access Control Policies
Sort
View
FDL
2004
IEEE
13 years 11 months ago
Real-Time Operating System Services for Realistic SystemC Simulation Models of Embedded Systems
gn process of embedded systems moves currently towards higher levels of abstraction. As a consequence, a need arises for an early and realistic assessment of system level design d...
P. Hastono, Stephan Klaus, Sorin A. Huss
IJHPCA
2007
114views more  IJHPCA 2007»
13 years 7 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
SIGCOMM
2009
ACM
14 years 2 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
ICDE
2003
IEEE
138views Database» more  ICDE 2003»
14 years 9 months ago
Using State Modules for Adaptive Query Processing
We present a query architecture in which join operators are decomposed into their constituent data structures (State Modules, or SteMs), and dataflow among these SteMs is managed ...
Vijayshankar Raman, Amol Deshpande, Joseph M. Hell...
IEEEARES
2009
IEEE
14 years 2 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...