Sciweavers

832 search results - page 17 / 167
» Effect of Malicious Synchronization
Sort
View
80
Voted
ACSAC
2005
IEEE
15 years 7 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
ATAL
2006
Springer
15 years 3 months ago
Effect of deceptive referrals on system stability
We study the problem of agents attempting to find quality service providers in a distributed environment. While referrals from other agents can be used to locate high-quality prov...
Ikpeme Erete, Teddy Candale, Sandip Sen
CSSE
2008
IEEE
15 years 3 months ago
JThreadSpy: A Tool for Improving the Effectiveness of Concurrent System Teaching and Learning
Both teaching and learning multithreaded ing are complex tasks, due to the abstraction of the concepts, the non-determinism of the scheduler, the impossibility of using classical s...
Giovanni Malnati, Caterina Maria Cuva, Claudia Bar...
124
Voted
ASPLOS
2011
ACM
14 years 5 months ago
Hybrid NOrec: a case study in the effectiveness of best effort hardware transactional memory
Transactional memory (TM) is a promising synchronization mechanism for the next generation of multicore processors. Best-effort Hardware Transactional Memory (HTM) designs, such a...
Luke Dalessandro, François Carouge, Sean Wh...
127
Voted
P2P
2006
IEEE
130views Communications» more  P2P 2006»
15 years 7 months ago
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough