Sciweavers

177 search results - page 28 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
AUSFORENSICS
2003
15 years 1 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
MSOM
2007
105views more  MSOM 2007»
14 years 11 months ago
Managing a Bank's Currency Inventory Under New Federal Reserve Guidelines
New currency recirculation guidelines implemented by the Federal Reserve System (Fed) of the United States are intended to reduce the overuse of its currency processing services b...
H. Neil Geismar, Milind Dawande, Divakar Rajamani,...
90
Voted
HPCA
2008
IEEE
16 years 2 days ago
PEEP: Exploiting predictability of memory dependences in SMT processors
Simultaneous Multithreading (SMT) attempts to keep a dynamically scheduled processor's resources busy with work from multiple independent threads. Threads with longlatency st...
Samantika Subramaniam, Milos Prvulovic, Gabriel H....
ACSAC
2007
IEEE
15 years 6 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
INFSOF
2000
91views more  INFSOF 2000»
14 years 11 months ago
An operational approach to the design of workflow systems
We construct models as an aid to our thought process. A particular class of models, operational models, can be used for simulation and prototyping. The Opj modeling language is su...
Rakesh Agarwal, Giorgio Bruno, Marco Torchiano