Sciweavers

345 search results - page 54 / 69
» Effective memory protection using dynamic tainting
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 4 months ago
Resource Management in Stargate-Based Ethernet Passive Optical Networks (SG-EPONs)
—At present there is a strong worldwide push toward bringing fiber closer to individual homes and businesses. Another evolutionary step is the cost-effective all-optical integra...
Lehan Meng, Chadi Assi, Martin Maier, Ahmad R. Dha...
ALENEX
2004
107views Algorithms» more  ALENEX 2004»
14 years 11 months ago
An Experimental Analysis of a Compact Graph Representation
In previous work we described a method for compactly representing graphs with small separators, which makes use of small separators, and presented preliminary experimental results...
Daniel K. Blandford, Guy E. Blelloch, Ian A. Kash
VEE
2005
ACM
140views Virtualization» more  VEE 2005»
15 years 3 months ago
Planning for code buffer management in distributed virtual execution environments
Virtual execution environments have become increasingly useful in system implementation, with dynamic translation techniques being an important component for performance-critical ...
Shukang Zhou, Bruce R. Childers, Mary Lou Soffa
AHSWN
2006
206views more  AHSWN 2006»
14 years 9 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
99
Voted
DAC
2003
ACM
15 years 10 months ago
Behavioral consistency of C and verilog programs using bounded model checking
We present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking. Both the circuit and the program ...
Edmund M. Clarke, Daniel Kroening, Karen Yorav