Sciweavers

5252 search results - page 1027 / 1051
» Logic in Access Control
Sort
View
ASPLOS
2006
ACM
15 years 1 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
110
Voted
CASES
2005
ACM
15 years 1 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
103
Voted
EUROPAR
2008
Springer
15 years 1 months ago
MPC: A Unified Parallel Runtime for Clusters of NUMA Machines
Over the last decade, Message Passing Interface (MPI) has become a very successful parallel programming environment for distributed memory architectures such as clusters. However, ...
Marc Pérache, Hervé Jourdren, Raymon...
86
Voted
LREC
2008
101views Education» more  LREC 2008»
15 years 1 months ago
The QALL-ME Benchmark: a Multilingual Resource of Annotated Spoken Requests for Question Answering
This paper presents the QALL-ME benchmark, a multilingual resource of annotated spoken requests in the tourism domain, freely available for research purposes. The languages curren...
Elena Cabrio, Milen Kouylekov, Bernardo Magnini, M...
AUSFORENSICS
2003
15 years 1 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
« Prev « First page 1027 / 1051 Last » Next »