Sciweavers

4764 search results - page 792 / 953
» Applications of Error-Control Coding
Sort
View
117
Voted
PLDI
2006
ACM
15 years 9 months ago
A microkernel virtual machine: : building security with clear interfaces
In this paper we propose a novel microkernel-based virtual machine (µKVM), a new code-based security framework with a simple and declarative security architecture. The main desig...
Xiaoqi Lu, Scott F. Smith
131
Voted
PPOPP
2006
ACM
15 years 9 months ago
Predicting bounds on queuing delay for batch-scheduled parallel machines
Most space-sharing parallel computers presently operated by high-performance computing centers use batch-queuing systems to manage processor allocation. In many cases, users wishi...
John Brevik, Daniel Nurmi, Richard Wolski
101
Voted
ACSAC
2005
IEEE
15 years 9 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
145
Voted
ACSC
2005
IEEE
15 years 9 months ago
Fractal Image Compression on a Pseudo Spiral Architecture
Fractal image compression is a relatively recent image compression method which exploits similarities in different parts of the image. The basic idea is to represent an image by f...
Huaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian H...
152
Voted
CLUSTER
2005
IEEE
15 years 9 months ago
Near Overhead-free Heterogeneous Thread-migration
Thread migration moves a single call-stack to another machine to improve either load balancing or locality. Current approaches for checkpointing and thread migration are either no...
Ronald Veldema, Michael Philippsen