Sciweavers

1803 search results - page 44 / 361
» Architectural framework for supporting operating system surv...
Sort
View
IPPS
2006
IEEE
15 years 7 months ago
Reducing the associativity and size of step caches in CRCW operation
Step caches are caches in which data entered to an cache array is kept valid only until the end of ongoing step of execution. Together with an advanced pipelined multithreaded arc...
M. Forsell
SEKE
2005
Springer
15 years 7 months ago
Service Identification and Packaging in Service Oriented Reengineering
With the adoption to Web service technologies, more and more existing non-service-oriented software systems turn to be legacy systems. They require a service-oriented reengineerin...
Zhuopeng Zhang, Ruimin Liu, Hongji Yang
92
Voted
ACSAC
1999
IEEE
15 years 5 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
CIDR
2009
139views Algorithms» more  CIDR 2009»
15 years 2 months ago
Inter-Operator Feedback in Data Stream Management Systems via Punctuation
High-volume, high-speed data streams may overwhelm the capabilities of stream processing systems; techniques such as data prioritization, avoidance of unnecessary processing and o...
Rafael Fernández-Moctezuma, Kristin Tufte, ...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 8 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee