Sciweavers

912 search results - page 138 / 183
» Design, Implementation, and Evaluation of a Repairable Datab...
Sort
View
98
Voted
ECOOPW
1999
Springer
15 years 5 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
ICAC
2009
IEEE
15 years 7 months ago
Self-correlating predictive information tracking for large-scale production systems
Automatic management of large-scale production systems requires a continuous monitoring service to keep track of the states of the managed system. However, it is challenging to ac...
Ying Zhao, Yongmin Tan, Zhenhuan Gong, Xiaohui Gu,...
107
Voted
COMPUTER
1998
131views more  COMPUTER 1998»
15 years 17 days ago
Windows NT Clustering Service
ER ABSTRACTIONS ter service uses several abstractions— including resource, resource dependencies, and resource groups—to simplify both the cluster service itself and user-visib...
Rod Gamache, Rob Short, Mike Massa
STORAGESS
2006
ACM
15 years 6 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller
TVLSI
2010
14 years 7 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi