Sciweavers

7576 search results - page 30 / 1516
» UNIX as an Application Program
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
LISA
2004
13 years 9 months ago
Solaris Zones: Operating System Support for Consolidating Commercial Workloads
Server consolidation, which allows multiple workloads to run on the same system, has become increasingly important as a way to improve the utilization of computing resources and r...
Daniel Price, Andrew Tucker
PC
2002
114views Management» more  PC 2002»
13 years 7 months ago
Optimizing noncontiguous accesses in MPI-IO
The I/O access patterns of many parallel applications consist of accesses to a large number of small, noncontiguous pieces of data. If an application's I/O needs are met by m...
Rajeev Thakur, William Gropp, Ewing L. Lusk
SIGMOD
2002
ACM
96views Database» more  SIGMOD 2002»
14 years 8 months ago
Toward Autonomic Computing with DB2 Universal Database
As the cost of both hardware and software falls due to technological advancements and economies of scale, the cost of ownership for database applications is increasingly dominated...
Sam Lightstone, Guy M. Lohman, Daniel C. Zilio
AINA
2007
IEEE
14 years 2 months ago
On the Contribution of Preamble to Information Hiding in Mimicry Attacks
In this paper, we aim to determine the significance of different stages of an attack, namely the preamble and the exploit, on an achieved anomaly rate. To this end, we analyze fou...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood