Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,250,721 papers from all fields of science
Search
Sign In
Create Free Account
Capability-based addressing
Known as:
Capability
, Capability addressing
In computer science, capability-based addressing is a scheme used by some computers to control access to memory. Under a capability-based addressing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
ACM Computing Surveys
Address space
Burroughs large systems
CAP computer
Expand
Broader (1)
Memory management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Towards Automatic Compartmentalization of C Programs on Capability Machines
Stelios Tsampas
,
Akram El-Korashy
,
Marco Patrignani
,
Dominique Devriese
,
D. Garg
,
Frank Piessens
2017
Corpus ID: 32838507
Capability-based protection mechanisms can offer fine-grained memory protection (through memory capabilities), as well as fine…
Expand
Highly Cited
2014
Highly Cited
2014
Next Generation Flight Management System for Real-Time Trajectory Based Operations
S. Ramasamy
,
R. Sabatini
,
A. Gardi
,
Trevor Kistan
2014
Corpus ID: 55411652
This paper presents the concept of operations, architecture and trajectory optimisation algorithms of a Next Generation Flight…
Expand
2014
2014
Sociomaterial Capabilities in Integrated Oil and gas Operations - Implications for Design
Marius Mikalsen
,
Elena Parmiggiani
,
V. Hepsø
European Conference on Information Systems
2014
Corpus ID: 18464926
Organisations must design and innovate capabilities in a symbiotic evolution between social and technical elements. Information…
Expand
1993
1993
On the notion of object
A. Taivalsaari
Journal of Systems and Software
1993
Corpus ID: 205046837
Review
1988
Review
1988
Concurrent Error Detection Using Watchdog Processors - A Survey
A. Mahmood
,
E. McCluskey
IEEE Trans. Computers
1988
Corpus ID: 1582463
Concurrent system-level error detection techniques using a watchdog processor are surveyed. A watchdog processor is a small and…
Expand
Highly Cited
1985
Highly Cited
1985
Communication Using Pseudonoise Modulation on Electric Power Distribution Circuits
P. K. V. D. Gracht
,
R. Donaldson
IEEE Transactions on Communications
1985
Corpus ID: 206637520
Localized communication networks for office automation, security monitoring, environmental management of buildings, computer…
Expand
Highly Cited
1981
Highly Cited
1981
IBM System/38 support for capability-based addressing
M. Houdek
,
F. Soltis
,
R. Hoffman
International Symposium on Computer Architecture
1981
Corpus ID: 11092428
The IBM System/38 provides capability-based addressing. This paper describes how support is divided among architectural…
Expand
1980
1980
A hardware implementation of capability-based addressing
G. Myers
,
B. Buckingham
OPSR
1980
Corpus ID: 1045945
The SWARD architecture, an experimental higher-level architecture, contains the naming and protection concept of capability-based…
Expand
Review
1979
Review
1979
Review and Revocation of Access Privileges Distributed Through Capabilities
V. Gligor
IEEE Transactions on Software Engineering
1979
Corpus ID: 15951232
The problems of review and revocation of access privileges are presented in the context of the systems that use capabilities for…
Expand
Highly Cited
1974
Highly Cited
1974
Capability-based addressing
R. S. Fabry
CACM
1974
Corpus ID: 5702682
Various addressing schemes making use of segment tables are examined. The inadequacies of these schemes when dealing with shared…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE