Sciweavers

8177 search results - page 486 / 1636
» Detecting System Emulators
Sort
View
CCGRID
2009
IEEE
15 years 2 months ago
A Live Storage Migration Mechanism over WAN for Relocatable Virtual Machine Services on Clouds
IaaS (Infrastructure-as-a-Service) is an emerging concept of cloud computing, which allows users to obtain hardware resources from virtualized datacenters. Although many commercial...
Takahiro Hirofuchi, Hirotaka Ogawa, Hidemoto Nakad...
HPCA
2012
IEEE
14 years 10 days ago
System-level implications of disaggregated memory
Recent research on memory disaggregation introduces a new architectural building block—the memory blade—as a cost-effective approach for memory capacity expansion and sharing ...
Kevin T. Lim, Yoshio Turner, Jose Renato Santos, A...
ACSAC
2008
IEEE
15 years 11 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
MIMI
2007
Springer
15 years 11 months ago
CAD on Brain, Fundus, and Breast Images
Three computer-aided detection (CAD) projects are hosted at the Gifu University, Japan as part of the “Knowledge Cluster Initiative” of the Japanese Government. These projects ...
Hiroshi Fujita, Yoshikazu Uchiyama, Toshiaki Nakag...
USS
2008
15 years 7 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May