Sciweavers

7971 search results - page 15 / 1595
» On unbounded operators and applications
Sort
View
TR
2008
98views more  TR 2008»
14 years 9 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
EGC
2005
Springer
15 years 3 months ago
Optimizing Grid Application Setup Using Operating System Mobility
This paper is about optimizing Grid application setup by allowing a user to configure a Grid application on her own PC and thereafter migrating the entire application onto the Gri...
Jacob Gorm Hansen, Eric Jul
HPDC
1998
IEEE
15 years 1 months ago
WebOS: Operating System Services for Wide Area Applications
In this paper, we argue for the power of providing a common set of OS services to wide area applications, including mechanisms for resource discovery, a global namespace, remote p...
Amin Vahdat, Thomas E. Anderson, Michael Dahlin, E...
SIGCOMM
1994
ACM
15 years 1 months ago
Signaling and Operating System Support for Native-Mode ATM Applications
Applications communicating over connectionless networks, such as IP, cannot obtain per-connection Quality of Service (QoS) guarantees. In contrast, the connection-oriented nature ...
Rosen Sharma, Srinivasan Keshav
OSDI
2006
ACM
15 years 9 months ago
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
In current commodity systems, applications have no way of limiting their trust in the underlying operating system (OS), leaving them at the complete mercy of an attacker who gains...
Richard Ta-Min, Lionel Litty, David Lie