Sciweavers

60 search results - page 2 / 12
» Microsoft windows programming strategies
Sort
View
IFIP
2005
Springer
15 years 3 months ago
Recovering Digital Evidence from Linux Systems
As Linux kernel-based operating systems gain market share there will be an inevitable increase in Linux systems that law enforcement agents must process at cybercrime scenes. The ...
Philip Craiger
ISCA
1998
IEEE
119views Hardware» more  ISCA 1998»
15 years 2 months ago
Execution Characteristics of Desktop Applications on Windows NT
This paper examines the performance of desktop applications running on the Microsoft Windows NT operating system on Intel x86 processors, and contrasts these applications to the p...
Dennis C. Lee, Patrick Crowley, Jean-Loup Baer, Th...
USS
2004
14 years 11 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
ACSAC
1999
IEEE
15 years 2 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
104
Voted
JOT
2006
82views more  JOT 2006»
14 years 10 months ago
The Initium RJS Screensaver: Part 1, MS Windows
This paper describes a Java-based screensaver technology for the Initium Remote Job Submission (RJS) system running on Microsoft Windows. Initium RJS is a Java Web Start (JAWS) te...
Douglas A. Lyon