Sciweavers

82 search results - page 7 / 17
» Privacy-Invasive Software and Preventive Mechanisms
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
DSN
2007
IEEE
14 years 4 months ago
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines
As server consolidation using virtual machines (VMs) is carried out, software aging of virtual machine monitors (VMMs) is becoming critical. Performance degradation or crash failu...
Kenichi Kourai, Shigeru Chiba
OSDI
2008
ACM
14 years 10 months ago
Live Migration of Direct-Access Devices
Virtual machine migration greatly aids management by allowing flexible provisioning of resources and decommissioning of hardware for maintenance. However, efforts to improve netwo...
Asim Kadav, Michael M. Swift
ICSE
2007
IEEE-ACM
14 years 10 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
KBSE
1999
IEEE
14 years 2 months ago
An Integration of Deductive Retrieval into Deductive Synthesis
Deductive retrieval and deductive synthesis are two conceptually closely related software development methods which apply theorem proving techniques to support the construction of...
Bernd Fischer 0002, Jon Whittle