Sciweavers

2068 search results - page 303 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
119
Voted
ACSAC
2007
IEEE
15 years 11 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
DATE
2007
IEEE
150views Hardware» more  DATE 2007»
15 years 11 months ago
Fast memory footprint estimation based on maximal dependency vector calculation
In data dominated applications, loop transformations have a huge impact on the lifetime of array data and therefore on memory footprint. Since a locally optimal loop transformatio...
Qubo Hu, Arnout Vandecappelle, Per Gunnar Kjeldsbe...
HICSS
2007
IEEE
87views Biometrics» more  HICSS 2007»
15 years 11 months ago
Eliciting Conceptual Models to Support Interdisciplinary Research
Constructing interdisciplinary knowledge requires knowledge sharing between researchers studying the same object from different disciplinary angles. Such sharing is particularly d...
Pieter J. Beers, Pieter W. G. Bots
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 11 months ago
Using Software Component Models and Services in Embedded Real-Time Systems
While the use of software component models has become popular in the development of desktop applications and distributed information systems, such models have not been widely used...
Frank Lüders, Shoaib Ahmad, Faisal Khizer, Gu...
HPCS
2007
IEEE
15 years 11 months ago
Nonlinear Simulation of Thermo-viscous Fingering in Miscible Displacements in Porous Media
The nonlinear simulation of interfacial instabilities in miscible displacements in porous media often requires sophisticated numerical algorithms as well as very fine spatial and ...
M. N. Islam, B. B. Maini, J. Azaiez