Sciweavers

1082 search results - page 125 / 217
» Policy support for call control
Sort
View
HIPEAC
2005
Springer
14 years 2 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
POS
1998
Springer
14 years 1 months ago
Optimizing the Read and Write Barriers for Orthogonal Persistence
Persistent programming languages manage volatile memory as a cache for stable storage, imposing a read barrier on operations that access the cache, and a write barrier on updates ...
Antony L. Hosking, Nathaniel Nystrom, Quintin I. C...
ICSE
2009
IEEE-ACM
13 years 6 months ago
A non-intrusive component-based approach for deploying unanticipated self-management behaviour
Supporting self-management behaviour by means of component-based architectural solutions has been the focus of many current research projects. In such a context, handling unantici...
Sandro Santos Andrade, Raimundo José de Ara...
ICDCSW
2005
IEEE
14 years 2 months ago
Zmail: Zero-Sum Free Market Control of Spam
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
EUC
2004
Springer
14 years 2 months ago
Securing Communications in the Smart Home
As the vision of ubiquitous computing becomes reality smart devices are embedded into our surroundings and domestic appliances providing services transparently. The nature of such ...
Patroklos G. Argyroudis, Donal O'Mahony