Sciweavers

2726 search results - page 404 / 546
» Application security support in the operating system kernel
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 6 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
OSDI
2008
ACM
16 years 5 months ago
Carnegie Mellon's CyDAT: Harnessing a Wide Array of Telemetry Data to Enhance Distributed System Diagnostics
The number and complexity of distributed applications has exploded, and to-date, each has had to create its own method for providing diagnostic tools and performance metrics. Thes...
Chas DiFatta, Mark Poepping, Daniel V. Klein
COOPIS
2000
IEEE
15 years 9 months ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...
147
Voted
DIGITALCITIES
2003
Springer
15 years 10 months ago
Map-Based Range Query Processing for Geographic Web Search Systems
In order to utilize geographic web information for digital city applications, we have been developing a geographic web search system, KyotoSEARCH. When users retrieve geographic in...
Ryong Lee, H. Shiina, Taro Tezuka, Yusuke Yokota, ...
143
Voted
WORDS
2003
IEEE
15 years 10 months ago
Object and Process Migration in .NET
Most of today’s distributed computing systems in the field do not support the migration of execution entities among computing nodes during runtime. The relatively static associa...
Peter Tröger, Andreas Polze