Sciweavers

396 search results - page 35 / 80
» Process Migration: A Generalized Approach Using a Virtualizi...
Sort
View
ADBIS
2009
Springer
143views Database» more  ADBIS 2009»
14 years 3 months ago
Cost-Based Vectorization of Instance-Based Integration Processes
The inefficiency of integration processes—as an abstraction of workflow-based integration tasks—is often reasoned by low resource utilization and significant waiting times f...
Matthias Böhm, Dirk Habich, Steffen Preissler...
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 2 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
EUROSYS
2006
ACM
14 years 5 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
SACMAT
2003
ACM
14 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
ACMACE
2006
ACM
14 years 2 months ago
AI-based world behaviour for emergent narratives
Research in Interactive Narrative has developed new approaches to the behaviour of virtual actors, but has dedicated little attention to the physical behaviour of the environment ...
Jean-Luc Lugrin, Marc Cavazza