Sciweavers

830 search results - page 73 / 166
» Planning as an architectural control mechanism
Sort
View
ACSAC
2001
IEEE
15 years 4 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
79
Voted
HASE
2007
IEEE
15 years 7 months ago
Systems Architectures for Transactional Network Interface
Systems such as software transactional memory and some exception handling techniques use transactions. However, a typical limitation of such systems is that they do not allow syst...
Manish Marwah, Shivakant Mishra, Christof Fetzer
ISCA
1998
IEEE
104views Hardware» more  ISCA 1998»
15 years 4 months ago
Selective Eager Execution on the PolyPath Architecture
Control-flow misprediction penalties are a major impediment to high performance in wide-issue superscalar processors. In this paper we present Selective Eager Execution (SEE), an ...
Artur Klauser, Abhijit Paithankar, Dirk Grunwald
89
Voted
IRI
2008
IEEE
15 years 7 months ago
FACT: A fusion architecture with contract templates for semantic and syntactic integration
Linking components with end-user requests for processing is problematic when there are fundamental language differences between component specifications and how individual users s...
Rose F. Gamble, Robert Baird, Leigh Flagg, Melody ...
119
Voted
SASO
2008
IEEE
15 years 7 months ago
On a Self-Organizing MANET Event Routing Architecture with Causal Dependency Awareness
Publish/subscribe (P/S) is a communication paradigm of growing popularity for information dissemination in largescale distributed systems. The strong decoupling between informatio...
Guanhong Pei, Binoy Ravindran, E. Douglas Jensen