Sciweavers

104 search results - page 20 / 21
» Operating System Support for Dynamic Code Loading in Sensor ...
Sort
View
EUROSYS
2008
ACM
14 years 2 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
JCSS
2008
81views more  JCSS 2008»
13 years 5 months ago
A simulator for adaptive parallel applications
Dynamically allocating computing nodes to parallel applications is a promising technique for improving the utilization of cluster resources. Detailed simulations can help identify...
Basile Schaeli, Sebastian Gerlach, Roger D. Hersch
SIES
2010
IEEE
13 years 3 months ago
A Comparison of Linux CAN Drivers and their Applications
The aim of this paper is to introduce LinCAN, a CAN driver system for Linux, developed at the Department of Control Engineering of the Czech Technical University in Prague, and to ...
Michal Sojka, Pavel Pisa, Martin Petera, Ondrej Sp...
NCA
2007
IEEE
13 years 11 months ago
Towards IQ-Appliances: Quality-awareness in Information Virtualization
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ï...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...
LCN
2002
IEEE
13 years 10 months ago
A User Level Framework for Ad Hoc Routing
The availability of inexpensive wireless networking hardware (e.g., based on the IEEE 802.11 standards) has generated interest in a large class of wireless applications. Many appl...
Jérémie Allard, Paul Gonin, Minoo Si...