Sciweavers

97 search results - page 4 / 20
» Consistency Checking of Safety and Availability in Access Co...
Sort
View
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
14 years 5 days ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
JDCTA
2008
74views more  JDCTA 2008»
13 years 5 months ago
Processing Logical Access Control Command in Computer System
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-...
COORDINATION
2006
Springer
13 years 9 months ago
Using Lime to Support Replication for Availability in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) define a challenging computing scenario where access to resources is restrained by connectivity among hosts. Replication offers an opportunity to in...
Amy L. Murphy, Gian Pietro Picco
IPPS
2000
IEEE
13 years 10 months ago
Controlling Distributed Shared Memory Consistency from High Level Programming Languages
One of the keys for the success of parallel processing is the availability of high-level programming languages for on-the-shelf parallel architectures. Using explicit message passi...
Yvon Jégou
ENTCS
2007
118views more  ENTCS 2007»
13 years 5 months ago
Safe Adaptation of Component Coordination
In the domain of software engineering, the use of software components is now a well established approach. However, it raises problems about the dynamic adaptation of these compone...
Christophe Sibertin-Blanc, Philippe Mauran, G&eacu...