Filters








581,753 Hits in 4.4 sec

Factors controlling community structure in heterogeneous metacommunities

Kendi F. Davies, Marcel Holyoak, Kim A. Preston, Valerie A. Offeman, Quenby Lum
2009 Journal of Animal Ecology  
In experimental protist communities, we found that non-spatial mechanisms unrelated to heterogeneity were responsible for a large component of baseline diversity.  ...  Our study illustrates that heterogeneity is not always the strongest driver of diversity, while experimentally demonstrating mechanisms by which heterogeneity alters community structure.  ...  for their comments.  ... 
doi:10.1111/j.1365-2656.2009.01559.x pmid:19457019 fatcat:weslvpk355hzlfavdjnnhax3nm

A Trusted Mobile Phone Prototype

Onur Aciicmez, Afshin Latifi, Jean-Pierre Seifert, Xinwen Zhang
2008 2008 5th IEEE Consumer Communications and Networking Conference  
However, we will demo another isolation technique specifically crafted for mobile platforms that respects their resource limitations.  ...  The specification requires separate trusted and isolated operational domains (Trusted Engines) for each stakeholder.  ...  Similar to resource isolation and controlled communication, TCG does not specify the implementation of IMV by a specific engine.  ... 
doi:10.1109/ccnc08.2007.270 dblp:conf/ccnc/AciicmezLSZ08 fatcat:7k56yhboubc6fjg7ohuq7quyia

SeVMM: VMM-Based Security Control Model

Chen Wen-Zhi, Zhu Hong-Wei, Huang Wei
2008 2008 International Conference on Cyberworlds  
By dividing the virtual resources into sharing virtual resources and normal ones, SeVMM provided secure mechanism for inter-domain communication control, which formed the base of multi-level security control  ...  Virtualization technology can improve the system's security, but did not satisfy the requirement of virtual resource sharing and innerdomain communication in distributed services and grid computing.  ...  While ensuring the domain isolation, it provides a secure control mechanism to control the communications and sharing of virtual resources between domains.  ... 
doi:10.1109/cw.2008.110 dblp:conf/cw/ChenZH08 fatcat:4mgo7ymcrrejneq2gqxvit2pqq

Squirrel

Inti Gonzalez-Herrera, Johann Bourcier, Walter Rudametkin, Olivier Barais, Francois Fouquet
2016 Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16  
Resource management is often realized through monitoring or process isolation (using virtual machines or system containers).  ...  We present an implementation of Squirrel, using a Java component framework, and a set of experiments to validate its feasibility and overhead.  ...  In practice, a channel must copy data at least twice, no matter what IPC 3 mechanism is used. In this paper we propose a new channel for intra-node communication.  ... 
doi:10.1145/2851613.2851768 dblp:conf/sac/Gonzalez-Herrera16 fatcat:udb5orkgpnhvpdomucby3on2oi

A trusted mobile phone reference architecturevia secure kernel

Xinwen Zhang, Onur Acıiçmez, Jean-Pierre Seifert
2007 Proceedings of the 2007 ACM workshop on Scalable trusted computing - STC '07  
Thus, in this paper, we propose another isolation technique, which is specifically crafted for mobile phone platforms and respects its resource limitations.  ...  However, despite of all its merits, the current "resource devourer" Virtualization is not very well suited for mobile devices.  ...  Isolation for a TCG complaint trusted mobile platform exists on resource level and interfaces can be the only permissible gateways for inter-engine communications.  ... 
doi:10.1145/1314354.1314359 dblp:conf/ccs/ZhangAS07 fatcat:tn6wof4fnvabrctemq6qlkwdw4

Towards Dynamic Component Isolation in a Service Oriented Platform [chapter]

Kiev Gama, Didier Donsez
2009 Lecture Notes in Computer Science  
In this paper we present a dynamic component isolation approach for the OSGi platform, based on a recently standardized Java mechanism.  ...  The traditional namespace based isolation and the security mechanisms provided in the Java platform (the base platform for OSGi) can restrict the access of such components but can not provide fault isolation  ...  Individual thanks to the anonymous reviewers for their valuable feedback and Laurent Daynès from Sun Microsystems for his review, suggestions on the paper, and the discussions about Isolates.  ... 
doi:10.1007/978-3-642-02414-6_7 fatcat:ot5izdvgsndpfev75ofib57izu

Evidence for a temperature acclimation mechanism in bacteria: an empirical test of a membrane-mediated trade-off

Edward K. Hall, Gabriel A. Singer, Martin J. Kainz, Jay T. Lennon
2010 Functional Ecology  
Here we evaluate a possible mechanistic explanation for shifts in bacterioplankton community composition in response to temperature by testing a previously hypothesized membrane mediated trade-off between  ...  Shifts in bacterial community composition along temporal and spatial temperature gradients occur in a wide range of habitats and have potentially important implications for ecosystem functioning.  ...  LaPara for rRNA sequencing of the isolates used in the experiments, and J. Cotner, A. Little and T. Scott for isolation and supply of the experimental strains.  ... 
doi:10.1111/j.1365-2435.2010.01707.x fatcat:nauhkzjmlncdjordqwwifpfjgi

Parallel many-core avionics systems

Miloš Panić, Eduardo Quiñones, Pavel G. Zaykov, Carles Hernandez, Jaume Abella, Francisco J. Cazorla
2014 Proceedings of the 14th International Conference on Embedded Software - EMSOFT '14  
SWPs, when running on top of single-core processors, provide robust time partitioning as a means to isolate SWPs timing behavior from each other.  ...  time partitioning to provide isolation among applications.  ...  For software resources shared among the processes of a SWP, ARINC 653 defines synchronization mechanisms (e.g. semaphores) for guaranteeing an exclusive access.  ... 
doi:10.1145/2656045.2656063 dblp:conf/emsoft/PanicQZHAC14 fatcat:g3en47s64naq5hnly4shdc2vsy

An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms

Guillaume Averlant, Benoit Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaaniche
2017 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC)  
The study focuses on Intel and ARM architectures, and outlines various hardware isolation resources that provide a security layer to the software running on these architectures.  ...  Several isolation mechanisms, at the software and the hardware layers, are now available to provide the best protection against these widespread attacks.  ...  As a consequence, more communication channels must be isolated in comparison with the ARM architecture (e.g., threats 2.1 and 2.2 for the MMU), and some mechanisms complete each other.  ... 
doi:10.1109/prdc.2017.48 dblp:conf/prdc/AverlantMANK17 fatcat:axr3ro6c5jcphfw5zzqxowfuua

5G Network Slicing: A Security Overview

Ruxandra F. Olimid, Gianfranco Nencioni
2020 IEEE Access  
This is just a first step in the 5G's development, and the true potential of 5G is still far from being reached.  ...  ., voice communication, video streaming, e-health, vehicular communication). Like every new technology, one of the critical aspects that need to be considered is the security.  ...  The resources should be configured to guarantee their availability for running security mechanisms and also avoid DoS (e.g., by resource capping or ring-fencing) [8] , [16] . 2) SERVICE-SERVICE COMMUNICATION  ... 
doi:10.1109/access.2020.2997702 fatcat:p7rqakawe5fgne5xpqffraun64

Towards Access Control for Isolated Applications

Kirill Belyaev, Indrakshi Ray
2016 Proceedings of the 13th International Joint Conference on e-Business and Telecommunications  
The policy classes are managed and enforced through a Linux Policy Machine (LPM) that acts as the centralized reference monitor and provides a uniform interface for accessing system resources and requesting  ...  Individual application components of such services may run in different isolated runtime environments, such as chrooted jails or application containers, and may need access to system resources and the  ...  However, no mechanism is provided for controlled communication and sharing of data objects between isolated applications across such environments.  ... 
doi:10.5220/0005970001710182 dblp:conf/secrypt/BelyaevR16 fatcat:x52coqttibfqtdekiujsmouiqa

A Survey on Security Mechanisms for NoC-based Many-Core SoCs

Luciano Lores Caimi, Rafael Faccenda, Fernando Gehm Moraes
2021 Journal of Integrated Circuits and Systems  
The adoption of many-cores systems introduces the concern for data protection as a critical design requirement due to the resource sharing and the simultaneous executions of several applications on the  ...  A secure application that processes sensitive data may have its security harmed by a malicious process.  ...  Reserving and isolating computation and communication resources inside a region of the M CSoC guarantees the secure execution.  ... 
doi:10.29292/jics.v16i2.485 fatcat:vc7hgae5arhxvmko2obif4lwl4

Page 941 of The Journal of Animal Ecology Vol. 78, Issue 5 [page]

2009 The Journal of Animal Ecology  
Key: connected leaf communities (black), connected wheat communities (red), isolated leaf communities (green), isolated wheat communities (blue).  ...  Connected leaf communities were intermediate between isolated leaf and connected and isolated wheat communities.  ... 

Java active extensions: Scalable middleware for performance-isolated remote execution

Travis Newhouse, Joseph Pasquale
2005 Computer Communications  
We present the design and implementation of a highly scalable and easily deployed middleware system that provides performance-isolated execution environments for client and server application functionality  ...  This is especially useful for wireless resource-limited clients, which can remotely locate filters, caches, monitors, buffers, etc., to act on their behalf and improve interactions with servers.  ...  Mechanisms for creating isolated, resource-controlled environments within a JVM are currently being developed [6, 7] .  ... 
doi:10.1016/j.comcom.2005.02.007 fatcat:xmamcr7ouffyvfvnkbcdntfbiy

Efficient resource provisioning for virtual clusters on the cloud

Shao Jui Chen, Chia Ching Chen, Hsiang n Lu, Wei Jen Wang
2017 International Journal of Services Technology and Management  
The information is then used by a resource provisioning mechanism to place virtual machines on physical machines, such that unnecessary network bandwidth consumption is reduced.  ...  A virtual cluster could consume a considerable amount of network bandwidth due to its internal communication demands.  ...  Therefore, further investigation is needed for the problem of virtual cluster placement. In this study, we propose a new resource allocation mechanism for the problem of virtual cluster placement.  ... 
doi:10.1504/ijstm.2017.081876 fatcat:qaaojaurlvfzleimj5m25e2pcq
« Previous Showing results 1 — 15 out of 581,753 results