Sciweavers

704 search results - page 122 / 141
» Resource Access Control for an Internet User Agent
Sort
View
CSFW
2011
IEEE
13 years 9 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
HIPEAC
2005
Springer
15 years 3 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
AIPS
2003
14 years 11 months ago
The Role of Planning in Grid Computing
Grid computing gives users access to widely distributed networks of computing resources to solve large-scale tasks such as scientific computation. These tasks are defined as stand...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...
SIGMETRICS
2010
ACM
139views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
On the flow-level dynamics of a packet-switched network
: The packet is the fundamental unit of transportation in modern communication networks such as the Internet. Physical layer scheduling decisions are made at the level of packets, ...
Ciamac Cyrus Moallemi, Devavrat Shah
GLOBECOM
2009
IEEE
15 years 4 months ago
Improving Deployability of Peer-Assisted CDN Platform with Incentive
Abstract—As a promising solution to manage the huge workload of large-scale VoD services, managed peer-assisted CDN systems, such as P4P [25] has attracted attention. Although th...
Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, H...