Sciweavers

1144 search results - page 143 / 229
» Protocol Implementation in a Vertically Structured Operating...
Sort
View
ACISP
2006
Springer
15 years 3 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
ICMCS
1994
IEEE
110views Multimedia» more  ICMCS 1994»
15 years 1 months ago
Improving Continuous-Media Playback Performance with In-Kernel Data Paths
Continuous media playback suffers when a station's operating system offers insufficient 1/0 throughput. Conventional 1/0 system structures support a memory-oriented read and ...
Kevin R. Fall, Joseph Pasquale
CCS
2010
ACM
14 years 7 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
USENIX
2001
14 years 11 months ago
The X Resize and Rotate Extension - RandR
The X Window System protocol, Version 11, was deliberately designed to be extensible, to provide for both anticipated and unanticipated needs. The X11 core did not anticipate that...
Jim Gettys, Keith Packard
LISA
2003
14 years 11 months ago
Using Service Grammar to Diagnose BGP Configuration Errors
Often network components work correctly, yet end-to-end services don’t. This happens if configuration parameters of components are set to incorrect values. Configuration is a fu...
Xiaohu Qie, Sanjai Narain