Sciweavers

1169 search results - page 124 / 234
» Migration without Virtualization
Sort
View
CSREASAM
2010
15 years 1 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...
123
Voted
OSDI
2008
ACM
16 years 3 months ago
Delivering Energy Proportionality with Non Energy-Proportional Systems - Optimizing the Ensemble
: ? Delivering Energy Proportionality with Non Energy-Proportional Systems-Optimizing the Ensemble Niraj Tolia, Zhikui Wang, Manish Marwah, Cullen Bash, Parthasarathy Ranganathan, ...
Niraj Tolia, Zhikui Wang, Manish Marwah, Cullen Ba...
SECON
2008
IEEE
15 years 9 months ago
Coordinated Locomotion of Mobile Sensor Networks
Stationary wireless sensor networks (WSNs) fail to scale when the area to be monitored is open (i.e borderless) and the physical phenomena to be monitored may migrate through a la...
Seokhoon Yoon, Onur Soysal, Murat Demirbas, Chunmi...
OOPSLA
2007
Springer
15 years 9 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
CASES
2006
ACM
15 years 9 months ago
Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems
Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network ...
Lan S. Bai, Lei Yang, Robert P. Dick