Sciweavers

451 search results - page 24 / 91
» A Distributed Digital Text Accessing and Acquisition System
Sort
View
CCS
2010
ACM
15 years 2 days ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ASPLOS
2010
ACM
15 years 4 months ago
An asymmetric distributed shared memory model for heterogeneous parallel systems
Heterogeneous computing combines general purpose CPUs with accelerators to efficiently execute both sequential control-intensive and data-parallel phases of applications. Existin...
Isaac Gelado, Javier Cabezas, Nacho Navarro, John ...
SOSP
1997
ACM
15 years 1 months ago
Frangipani: A Scalable Distributed File System
The idealdistributed file system wouldprovide all its userswith coherent,shared access tothe samesetoffiles,yetwould be arbitrarily scalable to provide more storage space and hi...
Chandramohan A. Thekkath, Timothy Mann, Edward K. ...
ERCIMDL
2000
Springer
98views Education» more  ERCIMDL 2000»
15 years 3 months ago
Personal Data in a Large Digital Library
The RePEc Economics library offers the largest distributed source of freely downloadable scientific research reports in the world. RePEc also contains details about Economics inst...
José Manuel Barrueco Cruz, Markus J. R. Kli...
ISW
2009
Springer
15 years 6 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee