Sciweavers

233 search results - page 25 / 47
» The Evolution of System-Call Monitoring
Sort
View
120
Voted
USENIX
2008
15 years 4 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox
SOSP
2007
ACM
15 years 11 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
100
Voted
CHI
2009
ACM
16 years 3 months ago
Supporting carers in their caring role through design
Carers are people who look after family, partners or friends who could not manage without them because of frailness, illness or disability. Our contribution is to show the potenti...
Andrea Taylor, Richard Wilson, Stefan Agamanolis
171
Voted
TOPNOC
2010
14 years 9 months ago
On-the-Fly Auditing of Business Processes
Information systems supporting business process are mostly very complex. If we have to ensure that certain business rules are enforced in a business process, it is often easier to ...
Kees M. van Hee, Jan Hidders, Geert-Jan Houben, Ja...
241
Voted
ICFP
2009
ACM
16 years 3 months ago
Identifying query incompatibilities with evolving XML schemas
During the life cycle of an XML application, both schemas and queries may change from one version to another. Schema evolutions may affect query results and potentially the validi...
Nabil Layaïda, Pierre Genevès, Vincent...