Memory protection

Results: 165



#Item
21

Transactional Memory with Strong Atomicity Using Off-the-Shelf Memory Protection Hardware Mart´ın Abadi⋆† Tim Harris⋆

Add to Reading List

Source URL: users.soe.ucsc.edu

Language: English - Date: 2009-03-16 13:56:28
    22

    Endpoint Protection ESET Endpoint Security for Android protects your company’s mobile fleet with ESET NOD32® proactive technology. It scans all applications, files and memory

    Add to Reading List

    Source URL: www.eset.it

    Language: English - Date: 2015-02-10 12:05:31
      23Computer memory / Common Criteria / Evaluation / Software / Protection Profile / Smart card / Flash memory / Proprietary software / Central processing unit / ISO standards / Computing / Software licenses

      Security IC Platform PP with packages

      Add to Reading List

      Source URL: sogis.eu

      Language: English - Date: 2014-08-25 01:47:51
      24Earth / Center for International Environmental Law / Environmental justice / Medupi Power Station / Coal / Mining / Environmentalism / Sustainability / Fossil-fuel power station / Environment / Environmental social science / Environmental protection

      2 CIEL Annual Report 2011 In memory of Wangari Maathai, 1940 – 2011 Environmentalist, Political Activist, Nobel Peace Prize recipient,

      Add to Reading List

      Source URL: ciel.org

      Language: English - Date: 2015-06-20 18:31:18
      25

      Poster Abstract: TinyOS 2.1 Adding Threads and Memory Protection to TinyOS The TinyOS Alliance (Including all members of the TinyOS 2.x related working groups) http://www.tinyos.net/scoop/special/working_groups

      Add to Reading List

      Source URL: www.cs.utah.edu

      Language: English - Date: 2009-04-13 14:58:42
        26Solid-state drive / IOPS / VMware / Computer data storage / Flash memory / Database / Conatus / Replication / Computing / Computer hardware / Computer storage

        Customer Case Study Conatus Capital Management Gains Data Protection While Increasing Performance in a Virtualized Environment by 6x

        Add to Reading List

        Source URL: kaminario.com

        Language: English - Date: 2014-01-31 16:17:48
        27Computer memory / Central processing unit / X86 architecture / Translation lookaside buffer / Memory management unit / Page table / Page Size Extension / X86 memory segmentation / Paging / Memory management / Computer architecture / Virtual memory

        Want processes to co-exist Issues in sharing physical memory • Protection - A bug in one process can corrupt memory in another - Must somehow prevent process A from trashing B’s memory

        Add to Reading List

        Source URL: www.scs.stanford.edu

        Language: English - Date: 2010-01-28 18:33:49
        28Microkernel / Capability-based security / Domain / Key / Windows key / Kernel / Function key / EROS / Memory protection / Computer architecture / Security / KeyKOS

        The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

        Add to Reading List

        Source URL: www.cap-lore.com

        Language: English - Date: 2009-05-04 18:57:36
        29

        CS261: Notes on Memory Protection Thibaud Hottelier September 8, 2009 1

        Add to Reading List

        Source URL: www.cs.berkeley.edu

        Language: English - Date: 2015-01-21 19:48:42
          30

          Scanned Committee of the Whole Supplemental Items - April 27, F. Taylor, Flag Lowering in Memory of 1887 Coal Mining Disaster and Cemetery Protection

          Add to Reading List

          Source URL: www.nanaimo.ca

          Language: English - Date: 2015-04-28 13:00:27
            UPDATE