Sciweavers

2863 search results - page 471 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
USS
2008
15 years 5 months ago
On Auditing Elections When Precincts Have Different Sizes
We address the problem of auditing an election when precincts may have different sizes. Prior work in this field has emphasized the simpler case when all precincts have the same s...
Javed A. Aslam, Raluca A. Popa, Ronald L. Rivest
CCS
2009
ACM
15 years 9 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
SACMAT
2009
ACM
15 years 9 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
JCST
2008
94views more  JCST 2008»
15 years 2 months ago
Runtime Engine for Dynamic Profile Guided Stride Prefetching
Stride prefetching is recognized as an important technique to improve memory access performance. The prior work usually profiles and/or analyzes the program behavior offline, and u...
Qiong Zou, Xiao-Feng Li, Long-Bing Zhang
MDM
2005
Springer
165views Communications» more  MDM 2005»
15 years 8 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...