Sciweavers

7118 search results - page 1168 / 1424
» Electrical and Computer Engineering
Sort
View
126
Voted
EUROSYS
2009
ACM
16 years 17 days ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
112
Voted
EUROSYS
2009
ACM
16 years 17 days ago
Koala: a platform for OS-level power management
Managing the power consumption of computing platforms is a complicated problem thanks to a multitude of hardware configuration options and characteristics. Much of the academic r...
David C. Snowdon, Etienne Le Sueur, Stefan M. Pett...
EUROSYS
2009
ACM
16 years 17 days ago
Improving the responsiveness of internet services with automatic cache placement
The backends of today’s Internet services rely heavily on caching at various layers both to provide faster service to common requests and to reduce load on back-end components. ...
Alexander Rasmussen, Emre Kiciman, V. Benjamin Liv...
134
Voted
EUROSYS
2006
ACM
16 years 17 days ago
URICA: Usage-awaRe Interactive Content Adaptation for mobile devices
Usage-awaRe Interactive Content Adaptation (URICA) is an automatic technique that adapts content for display on mobile devices based on usage semantics. URICA allows users who are...
Iqbal Mohomed, Jim Chengming Cai, Eyal de Lara
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
16 years 12 days ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
« Prev « First page 1168 / 1424 Last » Next »