Sciweavers

402 search results - page 45 / 81
» Measuring Operating System Overhead on CMT Processors
Sort
View
ESORICS
2008
Springer
15 years 3 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
VTC
2007
IEEE
150views Communications» more  VTC 2007»
15 years 7 months ago
Effects of Non-Ideal Channel Feedback on Dual-Stream MIMO-OFDMA System Performance
— In this paper we analyze the downlink OFDMA system-level performances of a 2x2 dual-stream MIMO multiuser transmission scheme under the assumptions of partial and noisy channel...
István Z. Kovács, Klaus I. Pedersen,...
EMSOFT
2004
Springer
15 years 6 months ago
Garbage collection for embedded systems
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
David F. Bacon, Perry Cheng, David Grove
SOSP
2005
ACM
15 years 10 months ago
IRON file systems
Commodity file systems trust disks to either work or fail completely, yet modern disks exhibit more complex failure modes. We suggest a new fail-partial failure model for disks, ...
Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, N...
SOSP
2007
ACM
15 years 10 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...