Sciweavers

378 search results - page 56 / 76
» Programming with Explicit Security Policies
Sort
View
ACSAC
2000
IEEE
13 years 12 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
USS
2004
13 years 9 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
ICALP
2003
Springer
14 years 22 days ago
Resource Access and Mobility Control with Dynamic Privileges Acquisition
µKlaim is a process language that permits programming distributed systems made up of several mobile components interacting through multiple distributed tuple spaces. We present th...
Daniele Gorla, Rosario Pugliese
HPCA
2008
IEEE
14 years 8 months ago
Branch-mispredict level parallelism (BLP) for control independence
A microprocessor's performance is fundamentally limited by the rate at which it can resolve branch mispredictions. Control independence (CI) architectures look for useful con...
Kshitiz Malik, Mayank Agarwal, Sam S. Stone, Kevin...
ICRA
2009
IEEE
179views Robotics» more  ICRA 2009»
14 years 2 months ago
Automatic weight learning for multiple data sources when learning from demonstration
— Traditional approaches to programming robots are generally inaccessible to non-robotics-experts. A promising exception is the Learning from Demonstration paradigm. Here a polic...
Brenna Argall, Brett Browning, Manuela M. Veloso