Sciweavers

245 search results - page 35 / 49
» Code Generation for Streaming: An Access Execute Mechanism
Sort
View
LCTRTS
2007
Springer
15 years 6 months ago
Addressing instruction fetch bottlenecks by using an instruction register file
The Instruction Register File (IRF) is an architectural extension for providing improved access to frequently occurring instructions. An optimizing compiler can exploit an IRF by ...
Stephen Roderick Hines, Gary S. Tyson, David B. Wh...
ICISS
2007
Springer
15 years 6 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
EUC
2004
Springer
15 years 5 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...
104
Voted
FMOODS
2003
15 years 1 months ago
Managing the Evolution of .NET Programs
Abstract. The component-based model of code execution imposes some requirements on the software components themselves, and at the same time lays some constraints on the modern run-...
Susan Eisenbach, Vladimir Jurisic, Chris Sadler
116
Voted
OSDI
1996
ACM
15 years 1 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee