Sciweavers

7197 search results - page 1378 / 1440
» On the computational power of BlenX
Sort
View
ASPLOS
2010
ACM
15 years 5 months ago
Orthrus: efficient software integrity protection on multi-cores
This paper proposes an efficient hardware/software system that significantly enhances software security through diversified replication on multi-cores. Recent studies show that a ...
Ruirui Huang, Daniel Y. Deng, G. Edward Suh
MOBISYS
2010
ACM
15 years 4 months ago
Energy-efficient rate-adaptive GPS-based positioning for smartphones
Many emerging smartphone applications require position information to provide location-based or context-aware services. In these applications, GPS is often preferred over its alte...
Jeongyeup Paek, Joongheon Kim, Ramesh Govindan
NSDI
2008
15 years 4 months ago
Phalanx: Withstanding Multimillion-Node Botnets
Large-scale distributed denial of service (DoS) attacks are an unfortunate everyday reality on the Internet. They are simple to execute and with the growing prevalence and size of...
Colin Dixon, Thomas E. Anderson, Arvind Krishnamur...
CASES
2005
ACM
15 years 3 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
CF
2005
ACM
15 years 3 months ago
A case for a working-set-based memory hierarchy
Modern microprocessor designs continue to obtain impressive performance gains through increasing clock rates and advances in the parallelism obtained via micro-architecture design...
Steve Carr, Soner Önder
« Prev « First page 1378 / 1440 Last » Next »