Sciweavers

2726 search results - page 449 / 546
» Application security support in the operating system kernel
Sort
View
SACMAT
2010
ACM
15 years 4 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
IISWC
2009
IEEE
15 years 6 months ago
A communication characterisation of Splash-2 and Parsec
Recent benchmark suite releases such as Parsec specifically utilise the tightly coupled cores available in chipmultiprocessors to allow the use of newer, high performance, models ...
Nick Barrow-Williams, Christian Fensch, Simon Moor...
USENIX
2001
15 years 1 months ago
Design and Implementation of the X Rendering Extension
The 2000 Usenix Technical Conference included a presentation outlining the state of the X rendering environment and the capabilities necessary to bring X into the modern world. Du...
Keith Packard
ECRTS
2002
IEEE
15 years 4 months ago
The FTT-Ethernet Protocol: Merging Flexibility, Timeliness and Efficiency
Despite having been designed to interconnect office equipment such as computers and printers, since its early days Ethernet has also been considered for use in the industrial doma...
Paulo Pedreiras, Luís Almeida, Paolo Gai
PLDI
2003
ACM
15 years 5 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...