Sciweavers

201 search results - page 39 / 41
» Typed Dynamic Control Operators for Delimited Continuations
Sort
View

Publication
211views
15 years 4 months ago
Congestion Avoidance in Computer Networks with A Connecitonless Network Layer: Part IV: A Selective Binary Feedback Scheme for G
With increasingly widespread use of computer networks, and the use of varied technology for the interconnection of computers, congestion is a significant problem. In this report, w...
K. Ramakrishnan and R. Jain,
EUROSYS
2009
ACM
14 years 3 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
SIGMETRICS
1996
ACM
122views Hardware» more  SIGMETRICS 1996»
13 years 10 months ago
Experiments with Digital Video Playback
In this paper we describe our experiments on digital video applications, concentrating on the static and dynamic tradeo s involved in video playback. Our results were extracted fr...
Richard Gerber, Ladan Gharai
DIMVA
2010
13 years 7 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
PPOPP
2009
ACM
14 years 6 months ago
Safe open-nested transactions through ownership
Researchers in transactional memory (TM) have proposed open nesting as a methodology for increasing the concurrency of transactional programs. The idea is to ignore "low-leve...
Kunal Agrawal, I.-Ting Angelina Lee, Jim Sukha