Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
This study examined the interplay among processor speed, cluster interconnect and file I/O, using parallel applications to quantify interactions. We focused on a common case wher...
1 This paper addresses the problem of side information generation in distributed video compression (DVC) schemes. Intermediate frames constructed by motioncompensated interpolation...
—Synchronous languages offer a deterministic model of concurrency at the level of actions. However, essentially all compilers for synchronous languages compile these actions into...
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...