Sciweavers

2863 search results - page 212 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
SOSP
2003
ACM
16 years 21 days ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
USENIX
1994
15 years 5 months ago
Secure Short-Cut Routing for Mobile IP
This paper describes the architecture and implementation of a mobile IP system. It allows mobile hosts to roam between cells implemented with 2-Mbps radio base stations, while mai...
Trevor Blackwell, Kee Chan, Koling Chang, Thomas C...
DAGM
2009
Springer
15 years 10 months ago
A Stereo Depth Recovery Method Using Layered Representation of the Scene
Recent progresses in stereo research imply that performance of the disparity estimation depends on the discontinuity localization in the disparity space which is generally predicat...
Tarkan Aydin, Yusuf Sinan Akgul
156
Voted
CHES
2011
Springer
276views Cryptology» more  CHES 2011»
14 years 3 months ago
FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control
Abstract. The paper presents a novel and efficient method to generate true random numbers on FPGAs by inducing metastability in bi-stable circuit elements, e.g. flip-flops. Meta...
Mehrdad Majzoobi, Farinaz Koushanfar, Srinivas Dev...
NDSS
2000
IEEE
15 years 7 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar