Sciweavers

933 search results - page 69 / 187
» Extending Forward Checking
Sort
View
111
Voted
USS
2004
15 years 2 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
113
Voted
ISCA
2003
IEEE
136views Hardware» more  ISCA 2003»
15 years 6 months ago
Transient-Fault Recovery for Chip Multiprocessors
To address the increasing susceptibility of commodity chip multiprocessors (CMPs) to transient faults, we propose Chiplevel Redundantly Threaded multiprocessor with Recovery (CRTR...
Mohamed A. Gomaa, Chad Scarbrough, Irith Pomeranz,...
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
15 years 4 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
107
Voted
AINA
2007
IEEE
15 years 7 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
105
Voted
AINA
2006
IEEE
15 years 6 months ago
Remote Trust with Aspect-Oriented Programming
Given a client/server application, how can the server entrust the integrity of the remote client, albeit the latter is running on an un-trusted machine? To address this research p...
Paolo Falcarin, Riccardo Scandariato, Mario Baldi