Sciweavers

14824 search results - page 2708 / 2965
» Security - Introduction
Sort
View
PDPTA
2000
15 years 4 months ago
Parallel Real-Time Cryptography: Beyond Speedup II
The primary purpose of parallel computation is the fast execution of computational tasks that are too slow to perform sequentially. However, it was shown recently that a second eq...
Selim G. Akl, Stefan D. Bruda
USENIX
2000
15 years 4 months ago
The Globe Distribution Network
The goal of the Globe project is to design and build a middleware platform that facilitates the development of large-scale distributed applications, such as those found on the Int...
Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz,...
OSDI
1994
ACM
15 years 4 months ago
A Caching Model of Operating System Kernel Functionality
Operating system research has endeavored to develop micro-kernels that provide modularity, reliability and security improvements over conventional monolithic kernels. However, the...
David R. Cheriton, Kenneth J. Duda
OSDI
1994
ACM
15 years 4 months ago
Metadata Update Performance in File Systems
Structural changes, such as file creation and block allocation, have consistently been identified as file system performance problems in many user environments. We compare several...
Gregory R. Ganger, Yale N. Patt
SEC
1996
15 years 4 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
« Prev « First page 2708 / 2965 Last » Next »