Sciweavers

1229 search results - page 163 / 246
» Live updating operating systems using virtualization
Sort
View
141
Voted
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 7 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
OSDI
1996
ACM
15 years 2 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...
COMCOM
2000
148views more  COMCOM 2000»
15 years 1 months ago
Advanced service provisioning based on mobile agents
Service provisioning is currently a challenging issue to offer future telecommunication services efficiently and at the same time in a flexible and user friendly manner. As a cont...
Peyman Farjami, Carmelita Görg, Frank Bell
ICDE
2012
IEEE
267views Database» more  ICDE 2012»
13 years 4 months ago
Scalable and Numerically Stable Descriptive Statistics in SystemML
—With the exponential growth in the amount of data that is being generated in recent years, there is a pressing need for applying machine learning algorithms to large data sets. ...
Yuanyuan Tian, Shirish Tatikonda, Berthold Reinwal...
TODAES
2008
158views more  TODAES 2008»
15 years 1 months ago
Designing secure systems on reconfigurable hardware
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deployment of custom hardware. Embedded systems based on reconfigurable hardware integ...
Ted Huffmire, Brett Brotherton, Nick Callegari, Jo...