Sciweavers

44 search results - page 6 / 9
» Reliably Executing Tasks in the Presence of Malicious Proces...
Sort
View
EUROPAR
2008
Springer
14 years 11 months ago
Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments
Abstract. Security and fault-tolerance is a big issue for intensive parallel computing in pervasive environments with hardware errors or malicious acts that may alter the result. I...
Sébastien Varrette, Jean-Louis Roch, Guilla...
92
Voted
ISCA
2009
IEEE
136views Hardware» more  ISCA 2009»
15 years 4 months ago
ECMon: exposing cache events for monitoring
The advent of multicores has introduced new challenges for programmers to provide increased performance and software reliability. There has been significant interest in technique...
Vijay Nagarajan, Rajiv Gupta
PRESENCE
2002
119views more  PRESENCE 2002»
14 years 9 months ago
Visual Homing Is Possible Without Landmarks: A Path Integration Study in Virtual Reality
The literature often suggests that proprioceptive and especially vestibular cues are required for navigation and spatial orientation tasks involving rotations of the observer. To ...
Bernhard E. Riecke, Henricus A. H. C. van Veen, He...
ASPLOS
2006
ACM
15 years 3 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
LCTRTS
2005
Springer
15 years 3 months ago
Preventing interrupt overload
Performance guarantees can be given to tasks in an embedded system by ensuring that access to each shared resource is mediated by an appropriate scheduler. However, almost all pre...
John Regehr, Usit Duongsaa