Sciweavers

518 search results - page 2 / 104
» Time-Sharing Parallel Applications with Performance Isolatio...
Sort
View
CCS
2007
ACM
13 years 11 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
COOPIS
2004
IEEE
13 years 9 months ago
A Distributed and Parallel Component Architecture for Stream-Oriented Applications
Abstract. This paper introduces ThreadMill - a distributed and parallel component architecture for applications that process large volumes of streamed (time-sequenced) data, such a...
Paulo Barthelmess, Clarence A. Ellis
ACSAC
1998
IEEE
13 years 9 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
GI
2000
Springer
13 years 9 months ago
Taming the Tiger: How to Cope with Real Database Products in Transactional Federations for Internet Applications
Data consistency in transactional federations is a key requirement of advanced E-service applications on the Internet, such as electronic auctions or real-estate purchase. Federat...
Ralf Schenkel, Gerhard Weikum
FDL
2006
IEEE
13 years 11 months ago
SystemC-A Modeling of an Automotive Seating Vibration Isolation System
Abstract— A modeling methodology for mixed physical domains system in a new modelling Language is presented. The system is automotive seating vibration isolation system with elec...
Hessa Al-Junaid, Tom J. Kazmierski, Leran Wang