Sciweavers

2195 search results - page 366 / 439
» Prototyping Networked Embedded Systems
Sort
View
PERCOM
2003
ACM
16 years 2 months ago
Smart Identification Frameworks for Ubiquitous Computing Applications
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Friedemann Mattern, Kay Römer, Thomas Dü...
PERCOM
2003
ACM
16 years 2 months ago
ReCalendar: Calendaring and Scheduling Applications with CPU and Energy Resource Guarantees for Mobile Devices
In this paper, we present an advance reservation scheme for CPU and energy resources, called ReCalendar. The goal is to enable soft real-time applications on mobile devices to ach...
Wanghong Yuan, Klara Nahrstedt
DSN
2009
IEEE
15 years 10 months ago
Fast memory state synchronization for virtualization-based fault tolerance
Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating syst...
Maohua Lu, Tzi-cker Chiueh
146
Voted
DSN
2009
IEEE
15 years 10 months ago
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal perfor...
Hari Kannan, Michael Dalton, Christos Kozyrakis
NDSS
2008
IEEE
15 years 9 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song