Sciweavers

1770 search results - page 1 / 354
» Writing requirements in computer security
Sort
View
ICPADS
1998
IEEE
13 years 9 months ago
Fast Mutual Exclusion Algorithms Using Read-Modify-Write and Atomic Read/Write Registers
: Three fast mutual exclusion algorithms using read-modify-write and atomic read/write registers are presented in a sequence, with an improvement from one to the next. The last alg...
Ting-Lu Huang
IPCCC
2006
IEEE
13 years 11 months ago
AWARDS: an adaptive write strategy for secure local disk systems
Since security is of critical importance for modern storage systems, it is imperative to protect stored data from being tampered or disclosed. Although an increasing number of sec...
Mais Nijim, Xiao Qin, Tao Xie 0004, Mohammed I. Al...
IPPS
2007
IEEE
13 years 11 months ago
Improving MPI Independent Write Performance Using A Two-Stage Write-Behind Buffering Method
Many large-scale production applications often have very long executions times and require periodic data checkpoints in order to save the state of the computation for program rest...
Wei-keng Liao, Avery Ching, Kenin Coloma, Alok N. ...
OOPSLA
2007
Springer
13 years 11 months ago
Recursive adaptive computations using perobject visitors
Adaptive Programming allows developers to write structureshy programs. However, in Adaptive Programming, recursive computations are known to require a good deal of boiler plate co...
Ahmed Abdelmeged, Karl J. Lieberherr