ACM SIGOPS

Results: 29



#Item
21Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
22Information technology management / Data mining / Principal component analysis / System monitoring / Simple Network Management Protocol / Streaming algorithm / Database / Remote sensing / Stream / Computing / Data analysis / Statistics

ACM SIGOPS Operating Systems Review. Vol 40 Issue 3. July, 2006. ACM Press. InteMon: Continuous Mining of Sensor Data in Large-scale Self-* Infrastructures Evan Hoke

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2006-09-12 15:14:24
23Digital media / Grants / Research / ACM SIGACT / Computer science / Nir Shavit / Distributed computing / Electronic submission / Middleware / Computing / Symposium on Principles of Distributed Computing / Competitions

Call for Papers Ninteenth Annual ACM SIGACT-SIGOPS Symposium on PRINCIPLES OF DISTRIBUTED COMPUTING (PODC) July 16 { 19, 2000, Portland, Oregon http://www.podc.org/podc2000/

Add to Reading List

Source URL: www.podc.org

Language: English - Date: 2014-09-23 21:31:06
24Digital electronics / Computer memory / Backup / Fault-tolerant system / Computer data storage / Electronic engineering / Fault-tolerant design / Error detection and correction / Electronics / Computing / Data security / Fault-tolerant computer systems

This position paper was prepared for and distributed at the 4th ACM SIGOPS European Workshop, Bologna, Italy, September 3-5, 1990, and published in Operating Systems Review 25, 1 (January, 1991), pages[removed]Thanks to J

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-03-21 12:36:02
25Database management systems / Database / Database theory / Server / World Wide Web / Backup / IBM Lotus Notes / Document management system / Computing / Data management / Information technology management

ACM SIGOPS 5th European Workshop NEEDED: A SYSTEMATIC STRUCTURING PARADIGM FOR DISTRIBUTED DATA by Jerome H. Saltzer Library 2000 M.I.T. Laboratory for Computer Science

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-03-16 20:00:18
26Computer science / Symposium on Operating Systems Principles / Grace Hopper Celebration of Women in Computing / Larry L. Peterson

ACM Operating Systems Review, Jan[removed]Report on SOSP 19 The 19th ACM SIGOPS Symposium on Operating Systems Principles was held October 19-22, 2003, at the Sagamore resort in Bolton Landing (Lake George), New York. The

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2011-04-01 17:21:04
27Hewlett-Packard / X Window System / Computing / Software / Symposium on Operating Systems Principles

17th ACM Symposium on Operating Systems Principles December 12-15, 1999 Kiawah Island Resort, near Charleston SC http://www.diku.dk/sosp99/ http://www.cs.dartmouth.edu/SOSP99/

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 1999-09-06 08:00:21
28System administration / Systems engineering / Project management / Scalability / Transaction processing / Evaluation Assurance Level / Utility / Reliability engineering / Dependability / Computing / Concurrent computing / Security

´ Appears in Proceedings of the 10th ACM SIGOPS European Workshop (EW-2002), Saint-Emilion, France, September 2002 A Utility-Centered Approach to Building Dependable Infrastructure Services George Candea and Armando Fox

Add to Reading List

Source URL: roc.cs.berkeley.edu

Language: English - Date: 2002-08-18 05:34:38
29Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components —

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2004-08-02 05:13:46
UPDATE