Sciweavers

1733 search results - page 135 / 347
» Self-Similarity in File Systems
Sort
View
USS
2010
15 years 2 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich
HASE
2002
IEEE
15 years 9 months ago
Extending WSDL to Facilitate Web Services Testing
Web services might be the most popular and powerful software development technology in today’s software world. Yet it brings software developers and tester a lot of challenges a...
Wei-Tek Tsai, Raymond A. Paul, Yamin Wang, Chun Fa...
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
15 years 8 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
WSC
2004
15 years 5 months ago
XML-Based Supply Chain Simulation Modeling
We describe a different approach to using XML to support the simulation modeling of supply chains. Instead of using XML to specify the simulation constructs, as most previous appr...
Dean C. Chatfield, Terry P. Harrison, Jack C. Hayy...
HOTOS
2007
IEEE
15 years 8 months ago
Purely Functional System Configuration Management
System configuration management is difficult because systems evolve in an undisciplined way: packages are upgraded, configuration files are edited, and so on. The management of ex...
Eelco Dolstra, Armijn Hemel