Sciweavers

171 search results - page 6 / 35
» Operating system enhancements to prevent the misuse of syste...
Sort
View
SYSTOR
2010
ACM
14 years 5 days ago
Operating system virtualization: practice and experience
Operating system (OS) virtualization can provide a number of important benefits, including transparent migration of applications, server consolidation, online OS maintenance, and...
Oren Laadan, Jason Nieh
USENIX
2001
13 years 8 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley
ACSAC
2002
IEEE
14 years 10 days ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
14 years 1 months ago
Intelligent Icons: Integrating Lite-Weight Data Mining and Visualization into GUI Operating Systems
The vast majority of visualization tools introduced so far are specialized pieces of software that are explicitly run on a particular dataset at a particular time for a particular...
Eamonn J. Keogh, Li Wei, Xiaopeng Xi, Stefano Lona...
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
14 years 22 days ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconfigurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka