Sciweavers

12 search results - page 2 / 3
» A sledgehammer approach to reuse of legacy device drivers
Sort
View
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
13 years 11 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
EMSOFT
2005
Springer
13 years 10 months ago
HAIL: a language for easy and correct device access
It is difficult to write device drivers. One factor is that writing low-level code for accessing devices and manipulating their registers is tedious and error-prone. For many syst...
Jun Sun 0002, Wanghong Yuan, Mahesh Kallahalla, Na...
TACAS
2004
Springer
111views Algorithms» more  TACAS 2004»
13 years 10 months ago
Automatic Creation of Environment Models via Training
Abstract. Model checking suffers not only from the state-space explosion problem, but also from the environment modeling problem: how can one create an accurate enough model of the...
Thomas Ball, Vladimir Levin, Fei Xie
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
13 years 10 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
TC
2010
12 years 11 months ago
Performance Comparison of Graphics Processors to Reconfigurable Logic: A Case Study
A systematic approach to the comparison of the graphics processor (GPU) and reconfigurable logic is defined in terms of three throughput drivers. The approach is applied to five ca...
Ben Cope, Peter Y. K. Cheung, Wayne Luk, Lee W. Ho...