Sciweavers

1733 search results - page 321 / 347
» Self-Similarity in File Systems
Sort
View
118
Voted
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 5 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
ICIA
2007
15 years 4 months ago
Improving Intelligent Assistants for Desktop Activities
Tasks have been identified as playing an important role to knowledge workers as high-level units for organizing their information. TaskTracer is a task-aware desktop system that l...
Simone Stumpf, Margaret M. Burnett, Thomas G. Diet...
LISA
2007
15 years 4 months ago
Stork: Package Management for Distributed VM Environments
In virtual machine environments each application is often run in its own virtual machine (VM), isolating it from other applications running on the same physical machine. Contentio...
Justin Cappos, Scott M. Baker, Jeremy Plichta, Duy...
108
Voted
DIMVA
2008
15 years 3 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
DIMVA
2006
15 years 3 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...