Sciweavers

1453 search results - page 49 / 291
» State and history in operating systems
Sort
View
IROS
2006
IEEE
121views Robotics» more  IROS 2006»
15 years 6 months ago
Motion Planning of Emergency Stop for Humanoid Robot by State Space Approach
— A motion planner of emergency stop must make an operating humanoid robot to a stationary state under the emergency signal. It plays an important role in prevention of falling o...
Mitsuharu Morisawa, Kenji Kaneko, Fumio Kanehiro, ...
93
Voted
CC
2003
Springer
114views System Software» more  CC 2003»
15 years 5 months ago
Combined Code Motion and Register Allocation Using the Value State Dependence Graph
We define the Value State Dependence Graph (VSDG). The VSDG is a form of the Value Dependence Graph (VDG) extended by the addition of state dependence edges to model sequentialise...
Neil Johnson, Alan Mycroft
CCS
2005
ACM
15 years 6 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
94
Voted
ISPASS
2008
IEEE
15 years 6 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
101
Voted
SIGMETRICS
2005
ACM
120views Hardware» more  SIGMETRICS 2005»
15 years 6 months ago
Managing server energy and operational costs in hosting centers
The growing cost of tuning and managing computer systems is leading to out-sourcing of commercial services to hosting centers. These centers provision thousands of dense servers w...
Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubram...