Sciweavers

218 search results - page 24 / 44
» Making Paths Explicit in the Scout Operating System
Sort
View
EUROSYS
2008
ACM
15 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
SAMOS
2010
Springer
14 years 7 months ago
OpenCL-based design methodology for application-specific processors
OpenCL is a programming language standard which enables the programmer to express the application by structuring its computation as kernels. The OpenCL compiler is given the explic...
Pekka O. Jaskelainen, Carlos S. de La Lama, Pablo ...
CMG
2001
14 years 11 months ago
Jump Start Your Performance Career Using Analytic Modeling
What is the career path for a performance analyst? A capacity planner? Most technicians paid their dues in the trenches of systems programming or operations. Having done it all, t...
Denise P. Kalm
SACMAT
2003
ACM
15 years 2 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
CLIMA
2004
14 years 11 months ago
Weighted Multi Dimensional Logic Programs
Abstract. We introduce a logical framework suitable to formalize structures of epistemic agents. Such a framework is based on the notion of weighted directed acyclic graphs (WDAGs)...
Pierangelo Dell'Acqua