Sciweavers

5123 search results - page 953 / 1025
» Performance and Security Tradeoff
Sort
View
91
Voted
NSDI
2004
14 years 11 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
74
Voted
WICSA
2001
14 years 11 months ago
A Compositional Approach for Constructing Connectors
Increasingly, systems are composed from independently developed parts, and mechanisms that allow those parts to interact (connectors). In many situations, specialized forms of int...
Bridget Spitznagel, David Garlan
USENIX
2003
14 years 11 months ago
CUP: Controlled Update Propagation in Peer-to-Peer Networks
— This paper proposes CUP, a protocol for performing Controlled Update Propagation to maintain caches of metadata in peer-to-peer networks. To moderate propagation without imposi...
Mema Roussopoulos, Mary Baker
70
Voted
PDPTA
2000
14 years 11 months ago
Parallel Real-Time Cryptography: Beyond Speedup II
The primary purpose of parallel computation is the fast execution of computational tasks that are too slow to perform sequentially. However, it was shown recently that a second eq...
Selim G. Akl, Stefan D. Bruda
86
Voted
OSDI
1994
ACM
14 years 11 months ago
A Caching Model of Operating System Kernel Functionality
Operating system research has endeavored to develop micro-kernels that provide modularity, reliability and security improvements over conventional monolithic kernels. However, the...
David R. Cheriton, Kenneth J. Duda