Sciweavers

979 search results - page 105 / 196
» Developing Dynamic Security Policies
Sort
View
150
Voted
ISCA
2002
IEEE
91views Hardware» more  ISCA 2002»
15 years 8 months ago
Slack: Maximizing Performance Under Technological Constraints
Many emerging processor microarchitectures seek to manage technological constraints (e.g., wire delay, power, and circuit complexity) by resorting to nonuniform designs that provi...
Brian A. Fields, Rastislav Bodík, Mark D. H...
JSAC
2008
254views more  JSAC 2008»
15 years 3 months ago
Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks
We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet sch...
Hang Su, Xi Zhang
USENIX
2004
15 years 5 months ago
Building Secure High-Performance Web Services with OKWS
OKWS is a toolkit for building fast and secure Web services. It provides Web developers with a small set of tools that has proved powerful enough to build complex systems with lim...
Maxwell N. Krohn
WSC
2004
15 years 5 months ago
Simulation of an Airport Passenger Security System
As part of the new security environment at the nation's airports, discrete event simulation modeling was applied shortly after 9-11 to understand the operational dynamics of ...
David R. Pendergraft, Craig V. Robertson, Shelly S...
EUROSYS
2007
ACM
16 years 1 months ago
Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels
Continuously running systems require kernel software updates applied to them without downtime. Facilitating fast reboots, or delaying an update may not be a suitable solution in m...
Kristis Makris, Kyung Dong Ryu