Sciweavers

1239 search results - page 102 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
CTW
2002
91views more  CTW 2002»
13 years 7 months ago
Can We Ever Escape from Data Overload? A Cognitive Systems Diagnosis
ive. This characterization leads to model-based abstractions and representation design techniques as potential solutions. Many of the existing approaches to coping with data overlo...
David D. Woods, Emily S. Patterson, Emilie M. Roth
CSCW
2011
ACM
13 years 3 months ago
It's about time: confronting latency in the development of groupware systems
The presence of network latency leads to usability problems in distributed groupware applications. Example problems include difficulty synchronizing tightly-coupled collaboration...
Cheryl Savery, T. C. Nicholas Graham
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 5 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
EUROSYS
2007
ACM
14 years 5 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...
MSWIM
2006
ACM
14 years 1 months ago
Performance evaluation of web services invocation over Bluetooth
Mobile devices should allow users to exploit services anytime, without any place restriction and in a transparent way. The Bluetooth technology achieves this feature, by providing...
Vincenzo Auletta, Carlo Blundo, Emiliano De Cristo...