Sciweavers

1472 search results - page 281 / 295
» Access control in virtual environments
Sort
View
USENIX
2008
15 years 2 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox
MICRO
2010
IEEE
156views Hardware» more  MICRO 2010»
14 years 10 months ago
Explicit Communication and Synchronization in SARC
SARC merges cache controller and network interface functions by relying on a single hardware primitive: each access checks the tag and the state of the addressed line for possible...
Manolis Katevenis, Vassilis Papaefstathiou, Stamat...
QSHINE
2009
IEEE
15 years 6 months ago
Integration of OMF-Based Testbeds in a Global-Scale Networking Facility
PlanetLab is a global scale platform for experimentation of new networking applications in a real environment. It consists of several nodes, offered by academic institutions or co...
Giovanni Di Stasi, Stefano Avallone, Roberto Canon...
ICDCSW
2005
IEEE
15 years 5 months ago
QoS Oriented Dynamic Replica Cost Model for P2P Computing
Replication on multiple nodes is an effective way to improve the availability in the P2P or grid environment. It is difficult to determine how many replicas can fulfill the user r...
Feng Mao, Hai Jin, Deqing Zou, Baoli Chen, Li Qi
ICISS
2005
Springer
15 years 5 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang