Memory protection

Results: 165



#Item
21Transactional Memory with Strong Atomicity Using Off-the-Shelf Memory Protection Hardware Mart´ın Abadi⋆† Tim Harris⋆

Transactional Memory with Strong Atomicity Using Off-the-Shelf Memory Protection Hardware Mart´ın Abadi⋆† Tim Harris⋆

Add to Reading List

Source URL: users.soe.ucsc.edu

Language: English - Date: 2009-03-16 13:56:28
    22Endpoint Protection  ESET Endpoint Security for Android protects your company’s mobile fleet with ESET NOD32® proactive technology. It scans all applications, files and memory

    Endpoint Protection ESET Endpoint Security for Android protects your company’s mobile fleet with ESET NOD32® proactive technology. It scans all applications, files and memory

    Add to Reading List

    Source URL: www.eset.it

    Language: English - Date: 2015-02-10 12:05:31
      23Security IC Platform PP with packages

      Security IC Platform PP with packages

      Add to Reading List

      Source URL: sogis.eu

      Language: English - Date: 2014-08-25 01:47:51
      242  CIEL Annual Report 2011 In memory of Wangari Maathai, 1940 – 2011 Environmentalist, Political Activist, Nobel Peace Prize recipient,

      2 CIEL Annual Report 2011 In memory of Wangari Maathai, 1940 – 2011 Environmentalist, Political Activist, Nobel Peace Prize recipient,

      Add to Reading List

      Source URL: ciel.org

      Language: English - Date: 2015-06-20 18:31:18
      25Poster Abstract: TinyOS 2.1 Adding Threads and Memory Protection to TinyOS The TinyOS Alliance (Including all members of the TinyOS 2.x related working groups)  http://www.tinyos.net/scoop/special/working_groups

      Poster Abstract: TinyOS 2.1 Adding Threads and Memory Protection to TinyOS The TinyOS Alliance (Including all members of the TinyOS 2.x related working groups) http://www.tinyos.net/scoop/special/working_groups

      Add to Reading List

      Source URL: www.cs.utah.edu

      Language: English - Date: 2009-04-13 14:58:42
        26Customer Case Study  Conatus Capital Management Gains Data Protection While Increasing Performance in a Virtualized Environment by 6x

        Customer Case Study Conatus Capital Management Gains Data Protection While Increasing Performance in a Virtualized Environment by 6x

        Add to Reading List

        Source URL: kaminario.com

        Language: English - Date: 2014-01-31 16:17:48
        27Want processes to co-exist  Issues in sharing physical memory • Protection - A bug in one process can corrupt memory in another - Must somehow prevent process A from trashing B’s memory

        Want processes to co-exist Issues in sharing physical memory • Protection - A bug in one process can corrupt memory in another - Must somehow prevent process A from trashing B’s memory

        Add to Reading List

        Source URL: www.scs.stanford.edu

        Language: English - Date: 2010-01-28 18:33:49
        28The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

        The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

        Add to Reading List

        Source URL: www.cap-lore.com

        Language: English - Date: 2009-05-04 18:57:36
        29CS261: Notes on Memory Protection Thibaud Hottelier September 8, 2009 1

        CS261: Notes on Memory Protection Thibaud Hottelier September 8, 2009 1

        Add to Reading List

        Source URL: www.cs.berkeley.edu

        Language: English - Date: 2015-01-21 19:48:42
          30Scanned Committee of the Whole Supplemental Items - April 27, F. Taylor, Flag Lowering in Memory of 1887 Coal Mining Disaster and Cemetery Protection

          Scanned Committee of the Whole Supplemental Items - April 27, F. Taylor, Flag Lowering in Memory of 1887 Coal Mining Disaster and Cemetery Protection

          Add to Reading List

          Source URL: www.nanaimo.ca

          Language: English - Date: 2015-04-28 13:00:27