Sciweavers

218 search results - page 9 / 44
» Making Paths Explicit in the Scout Operating System
Sort
View
USS
2008
14 years 12 months ago
Panic Passwords: Authenticating under Duress
Panic passwords allow a user to signal duress during authentication. We show that the well-known model of giving a user two passwords, a `regular' and a `panic' password...
Jeremy Clark, Urs Hengartner
HOTOS
2003
IEEE
15 years 2 months ago
Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection
Two big problems with operating systems written in unsafe languages are that they crash too often and that adding features becomes much more difficult over time. One cause of bot...
Emmett Witchel, Krste Asanovic
CIKM
2010
Springer
14 years 8 months ago
Fast and accurate estimation of shortest paths in large graphs
Computing shortest paths between two given nodes is a fundamental operation over graphs, but known to be nontrivial over large disk-resident instances of graph data. While a numbe...
Andrey Gubichev, Srikanta J. Bedathur, Stephan Seu...
PLANX
2007
14 years 11 months ago
XML Transformation Language Based on Monadic Second Order Logic
Although monadic second-order logic (MSO) has been a foundation of XML queries, little work has attempted to take MSO formulae themselves as a programming construct. Indeed, MSO f...
Kazuhiro Inaba, Haruo Hosoya
CHIMIT
2008
ACM
14 years 11 months ago
Policy-based IT automation: the role of human judgment
Policy-based automation is emerging as a viable approach to IT systems management, codifying high-level business goals into executable specifications for governing IT operations. ...
Eser Kandogan, John H. Bailey, Paul P. Maglio, Ebe...