Sciweavers

4445 search results - page 768 / 889
» Reflective Authorization Systems
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
RTCSA
1995
IEEE
15 years 1 months ago
A timeliness-guaranteed kernel model-DREAM kernel-and implementation techniques
: An essential building-block for construction of future real-time computer systems (RTCS’s) is a timeliness-guaranteed operating system. The first co-author recently formulated ...
K. H. (Kane) Kim, Luiz F. Bacellar, Yuseok Kim, Ch...
ECSCW
1993
14 years 11 months ago
Do Categories Have Politics? The Language/Action Perspective Reconsidered
: Drawing on writings within the CSCW community and on recent social theory, this paper proposes that the adoption of speech act theory as a foundation for system design carries wi...
Lucy A. Suchman
98
Voted
OSDI
1996
ACM
14 years 11 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
102
Voted
MM
2010
ACM
207views Multimedia» more  MM 2010»
14 years 10 months ago
TalkMiner: a search engine for online lecture video
TalkMiner is a search engine for lecture webcasts. Lecture videos are processed to recover a set of distinct slide images and OCR is used to generate a list of indexable terms fro...
John Adcock, Matthew Cooper, Laurent Denoue, Hamed...