Sciweavers

5269 search results - page 893 / 1054
» Operating system resource management
Sort
View
EUROSYS
2006
ACM
16 years 1 months ago
On the road to recovery: restoring data after disasters
—Restoring data operations after a disaster is a daunting task: how should recovery be performed to minimize data loss and application downtime? Administrators are under consider...
Kimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Ar...
153
Voted
SOSP
2009
ACM
16 years 1 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
157
Voted
CMS
2003
171views Communications» more  CMS 2003»
15 years 6 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
ICDE
2011
IEEE
281views Database» more  ICDE 2011»
14 years 8 months ago
Declarative analysis of noisy information networks
—There is a growing interest in methods for analyzing data describing networks of all types, including information, biological, physical, and social networks. Typically the data ...
Walaa Eldin Moustafa, Galileo Namata, Amol Deshpan...
ELPUB
2007
ACM
15 years 8 months ago
Technical Infrastructure and Policy Framework for Maximising the Benefits from Research Output
Electronic publishing is one part of a much larger process. There is a research lifecycle from creation of a programme for funded research through research proposals, projects, ou...
Keith G. Jeffery