Sciweavers

417 search results - page 50 / 84
» Product Configurations - An Application for Prototype Object...
Sort
View
CCS
2010
ACM
13 years 7 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
JUCS
2010
135views more  JUCS 2010»
13 years 6 months ago
A Service-Oriented Platform for Ubiquitous Personalized Multimedia Provisioning
: As multimedia contents are becoming widely used in ubiquitous computing environments among many application fields, e.g., education, entertainment, and live surveillance, the dem...
Zhiwen Yu, Changde Li, Xingshe Zhou, Haipeng Wang
HPCA
2002
IEEE
14 years 8 months ago
The Minimax Cache: An Energy-Efficient Framework for Media Processors
This work is based on our philosophy of providing interlayer system-level power awareness in computing systems [26, 27]. Here, we couple this approach with our vision of multipart...
Osman S. Unsal, Israel Koren, C. Mani Krishna, Csa...
EUROPAR
2008
Springer
13 years 9 months ago
Complementarity between Virtualization and Single System Image Technologies
Nowadays, the use of clusters in research centers or industries is undeniable. Since few years, the usage of virtual machines (VM) offers more advanced resource management capabili...
Jérôme Gallard, Geoffroy Vallé...
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
14 years 8 days ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...