Sciweavers

617 search results - page 98 / 124
» Debugging distributed programs using controlled re-execution
Sort
View
100
Voted
NDSS
2009
IEEE
15 years 9 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
130
Voted
PPOPP
1999
ACM
15 years 6 months ago
Dynamic Instrumentation of Threaded Applications
The use of threads is becoming commonplace in both sequential and parallel programs. This paper describes our design and initial experience with non-trace based performance instru...
Zhichen Xu, Barton P. Miller, Oscar Naim
CCS
2008
ACM
15 years 4 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
118
Voted
HPCC
2005
Springer
15 years 7 months ago
A Loop-Aware Search Strategy for Automated Performance Analysis
Abstract. Automated online search is a powerful technique for performance diagnosis. Such a search can change the types of experiments it performs while the program is running, mak...
Eli D. Collins, Barton P. Miller
SIGCOMM
2010
ACM
15 years 2 months ago
The case for active device drivers
We revisit the device-driver architecture supported by the majority of operating systems, where a driver is a passive object that does not have its own thread of control and is on...
Leonid Ryzhyk, Yanjin Zhu, Gernot Heiser