Sciweavers

750 search results - page 122 / 150
» Virtual Environments - Framework for Virtualized Resource Ac...
Sort
View
IADIS
2003
13 years 9 months ago
Application of Metadata and Replication Mechanisms in Industrial Databases
Power transformers' failures carry great costs to electric companies since they need resources to recover from them and to perform periodical maintenance. To avoid this probl...
Perfecto Mariño, César A. Sigüe...
SACMAT
2006
ACM
14 years 2 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
JCM
2006
99views more  JCM 2006»
13 years 8 months ago
VIP (VHE in Mobile IP Networks) Architecture
In this study we propose a new architecture named VIP (VHE in mobile IP networks) which guarantees authorized user access and user mobility management. The main goal is to bring th...
Octavio Ramirez Rojas, Jalel Ben-Othman, Safouane ...
VEE
2010
ACM
327views Virtualization» more  VEE 2010»
14 years 3 months ago
AASH: an asymmetry-aware scheduler for hypervisors
Asymmetric multicore processors (AMP) consist of cores exposing the same instruction-set architecture (ISA) but varying in size, frequency, power consumption and performance. AMPs...
Vahid Kazempour, Ali Kamali, Alexandra Fedorova
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
12 years 4 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross