Sciweavers

1054 search results - page 29 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
IWANN
2007
Springer
15 years 8 months ago
Towards the Integration of a Bioprofile in Ocular Melanoma
Approximately 50% of all patients with intraocular melanoma die of metastatic disease, despite successful treatment of the primary tumour. The main factors associated with mortalit...
Azzam F. Taktak, Antonio Eleuteri, Christian Setzk...
I3E
2009
127views Business» more  I3E 2009»
14 years 11 months ago
Not All Adware Is Badware: Towards Privacy-Aware Advertising
Abstract. Online advertising is a major economic force in the Internet today. A basic goal of any advertising system is to accurately target the ad to the recipient audience. While...
Hamed Haddadi, Saikat Guha, Paul Francis
ENTCS
2008
94views more  ENTCS 2008»
15 years 2 months ago
A Formal Model of Memory Peculiarities for the Verification of Low-Level Operating-System Code
This paper presents our solutions to some problems we encountered in an ongoing attempt to verify the micro-hypervisor currently developed within the Robin project. The problems t...
Hendrik Tews, Tjark Weber, Marcus Völp
CCS
2009
ACM
15 years 8 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
CLUSTER
2001
IEEE
15 years 5 months ago
SOVIA: A User-level Sockets Layer Over Virtual Interface Architecture
The Virtual Interface Architecture (VIA) is an industry standard user-level communication architecture for system area networks. The VIA provides a protected, directlyaccessible i...
Jin-Soo Kim, Kangho Kim, Sung-In Jung