Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,587,381 papers from all fields of science
Search
Sign In
Create Free Account
Process isolation
Known as:
Multi process browser
, Content chrome separation
, Process-per-tab
Expand
Process isolation is a set of different hardware and software technologies designed to protect each process from other processes on the operating…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
DOS
Google Chrome
Inter-process communication
Internet Explorer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Using Docker for High Performance 1
P. Murugan
,
Suraj Subramanian
,
Mr. V Pandarinathan
,
D. Rajinigirinath
2018
Corpus ID: 56472927
Virtualization technology plays a vital role in cloud computing. In particular, benefits of virtualization are widely employed in…
Expand
2016
2016
Research on Wireless Network Security Technology
Weng-jing Yang
,
Zhi-yuan Li
,
Huai-jun Zhou
,
Ran Li
,
H. Zhao
2016
Corpus ID: 59940516
With the popularization and application of wireless networks, people are dependent on wireless networks is increasing, at the…
Expand
2016
2016
An FPGA-based implementation of a vector coprocessor for control applications
Nitish Das
,
P. Priya
2016
Corpus ID: 212446809
The vector coprocessor (VP) is taken as a potential solution for control applications because of its low power consumption and…
Expand
2015
2015
Chapter 29 Shelter and Income Opportunities for Women in India
Sulakshana Mahajan SuiBksh
2015
Corpus ID: 39300186
SuiBksh•n• M•h•J•n Is a senior architect with Gherzi Eastern Umited In Bombay. She received her Bachelor ofArchitecture from the…
Expand
2013
2013
DREMS : OS Support for Managed Distributed Real-time Embedded Systems
W. Emfinger
,
P. Kumar
,
+5 authors
Gabor Karsai Isis
2013
Corpus ID: 12020804
Distributed real-time and embedded (DRE) systems composed of mixed criticality task sets are increasingly being deployed in…
Expand
2010
2010
What organisational/employer level interventions are effective for preventing and treating occupational stress?
A. LaMontagne
,
Tg Keegel
2010
Corpus ID: 68804795
2007
2007
Cell Broadband Engine processor vault security architecture
Kanna Shimizu
,
H. P. Hofstee
,
J. Liberty
IBM Journal of Research and Development
2007
Corpus ID: 8493581
Current data protection technologies such as those based on public-key encryption and broadcast encryption focus on the secure…
Expand
2005
2005
Group Membership for Peer-to-Peer Communication
Tucci Piergiovanni
2005
Corpus ID: 1598015
This paper studies the problem of maintaining eventual consistent group membership without any synchrony assumption inside an…
Expand
1999
1999
Formalizing Process Protection in Application Adaptive Reconfigurable Architectures
J. Byun
,
A. Chien
1999
Corpus ID: 18218441
Technology scaling of CMOS processes brings relatively faster transistors (gates) and slower interconnects (wires), making viable…
Expand
1991
1991
Verifiable Computer Security and Hardware: Issues
W. Young
1991
Corpus ID: 26684371
This report explores the influences of hardware on verifiable secure system design and envisions a mutually beneficial…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required