Sciweavers

185 search results - page 28 / 37
» Analysis of virtual machine system policies
Sort
View
CIKM
2010
Springer
14 years 10 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
ASWEC
2009
IEEE
14 years 10 months ago
From Requirements to Embedded Software - Formalising the Key Steps
Failure of a design to satisfy a system's requirements can result in schedule and cost overruns. When using current approaches, ensuring requirements are satisfied is often d...
Toby Myers, R. Geoff Dromey
140
Voted
ISCAPDCS
2008
15 years 1 months ago
LinSched: The Linux Scheduler Simulator
The Linux kernel 2.6.23 scheduler includes substantial changes that may entice researchers with no prior interest in Linux to attempt to understand or modify its behavior. Often, ...
John M. Calandrino, Dan P. Baumberger, Tong Li, Je...
140
Voted
SBRN
2008
IEEE
15 years 6 months ago
Multi-label Text Categorization Using VG-RAM Weightless Neural Networks
In automated multi-label text categorization, an automatic categorization system should output a category set, whose size is unknown a priori, for each document under analysis. Ma...
Claudine Badue, Felipe Pedroni, Alberto Ferreira d...
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 6 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken