Sciweavers

194 search results - page 4 / 39
» I-RMI: Performance Isolation in Information Flow Application...
Sort
View
MOBISYS
2003
ACM
14 years 5 months ago
iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications
Due to node mobility and limitations on bandwidth availability in wireless channels, there exist unique challenges towards achieving efficient and effective information access in ...
Zongpeng Li, Baochun Li, Dongyan Xu, Xin Zhou
ACSAC
2006
IEEE
13 years 11 months ago
A General Dynamic Information Flow Tracking Framework for Security Applications
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
Lap-Chung Lam, Tzi-cker Chiueh
PLDI
2003
ACM
13 years 11 months ago
Bug isolation via remote program sampling
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program’s user community. Several example applications illustrat...
Ben Liblit, Alexander Aiken, Alice X. Zheng, Micha...
DATE
2006
IEEE
113views Hardware» more  DATE 2006»
13 years 11 months ago
Automatic ADL-based operand isolation for embedded processors
Cutting-edge applications of future embedded systems demand highest processor performance with low power consumption to get acceptable battery-life times. Therefore, low power opt...
Anupam Chattopadhyay, B. Geukes, David Kammler, Er...
INFOCOM
2005
IEEE
13 years 11 months ago
Dependency isolation for thread-based multi-tier Internet services
— Multi-tier Internet service clusters often contain complex calling dependencies among service components spreading across cluster nodes. Without proper handling, partial failur...
Lingkun Chu, Kai Shen, Hong Tang, Tao Yang, Jingyu...