Sciweavers

5838 search results - page 888 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
ACMSE
2004
ACM
15 years 10 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
CC
2003
Springer
114views System Software» more  CC 2003»
15 years 9 months ago
Combined Code Motion and Register Allocation Using the Value State Dependence Graph
We define the Value State Dependence Graph (VSDG). The VSDG is a form of the Value Dependence Graph (VDG) extended by the addition of state dependence edges to model sequentialise...
Neil Johnson, Alan Mycroft
IPPS
1996
IEEE
15 years 8 months ago
ECO: Efficient Collective Operations for Communication on Heterogeneous Networks
PVM and other distributed computing systems have enabled the use of networks of workstations for parallel computation, but their approach of treating all networks as collections o...
Bruce Lowekamp, Adam Beguelin
IFIP
1994
Springer
15 years 8 months ago
E-mail as an Enabling Technology in Brazil: The CNPq/ProTeM-CC Experience
Development of a research project in Computer Science, integrating a considerable number of research institutions and about 1200 individual researchers all over a country with big...
José Palazzo M. de Oliveira, Norberto Hoppe...
ASPLOS
2008
ACM
15 years 6 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...