Sciweavers

2726 search results - page 45 / 546
» Application security support in the operating system kernel
Sort
View
132
Voted
ICS
2000
Tsinghua U.
15 years 8 months ago
Using complete system simulation to characterize SPECjvm98 benchmarks
Complete system simulation to understand the influence of architecture and operating systems on application execution has been identified to be crucial for systems design. While t...
Tao Li, Lizy Kurian John, Narayanan Vijaykrishnan,...
SEUS
2007
IEEE
15 years 11 months ago
Transparent and Selective Real-Time Interrupt Services for Performance Improvement
The popularity of mobile and multimedia applications made real-time support a mandatory feature for embedded operating systems. However, the current situation is that the overall p...
Jinkyu Jeong, Euiseong Seo, Dongsung Kim, Jinsoo K...
RECOSOC
2007
115views Hardware» more  RECOSOC 2007»
15 years 6 months ago
Self-adaptive Security at Application Level: a Proposal
—Self-adaptive systems have the ability to adapt themselves to mutating external or internal conditions without requesting any intervention of the user; the security of such syst...
Alberto Ferrante, Antonio Vincenzo Taddeo, Mariagi...
EWSN
2007
Springer
16 years 4 months ago
Multithreading Optimization Techniques for Sensor Network Operating Systems
While a multithreading approach provides a convenient sensor application developing environment with automatic control flow and stack managment, it is considered to have a larger d...
Hyoseung Kim, Hojung Cha
PPOPP
1999
ACM
15 years 9 months ago
MagPIe: MPI's Collective Communication Operations for Clustered Wide Area Systems
Writing parallel applications for computational grids is a challenging task. To achieve good performance, algorithms designed for local area networks must be adapted to the differ...
Thilo Kielmann, Rutger F. H. Hofman, Henri E. Bal,...