Sciweavers

2030 search results - page 160 / 406
» The Need for Customizable Operating Systems
Sort
View
163
Voted
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 8 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
LICS
1989
IEEE
15 years 8 months ago
Elf: A Language for Logic Definition and Verified Metaprogramming
We describe Elf, a metalanguage for proof manipulation environments that are independent of any particular logical system. Elf is intended for meta-programs such as theorem prover...
Frank Pfenning
SIGMETRICS
2012
ACM
267views Hardware» more  SIGMETRICS 2012»
13 years 7 months ago
Smartphones vs. laptops: comparing web browsing behavior and the implications for caching
In this work we present the differences and similarities of the web browsing behavior in most common mobile platforms. We devise a novel Operating System (OS) fingerprinting met...
Ioannis Papapanagiotou, Erich M. Nahum, Vasileios ...
VLSID
2007
IEEE
210views VLSI» more  VLSID 2007»
16 years 5 months ago
Dynamically Optimizing FPGA Applications by Monitoring Temperature and Workloads
In the past, Field Programmable Gate Array (FPGA) circuits only contained a limited amount of logic and operated at a low frequency. Few applications running on FPGAs consumed exc...
Phillip H. Jones, Young H. Cho, John W. Lockwood
OSDI
2002
ACM
16 years 5 months ago
Optimizing the Migration of Virtual Computers
This paper shows how to quickly move the state of a running computer across a network, including the state in its disks, memory, CPU registers, and I/O devices. We call this state...
Constantine P. Sapuntzakis, Ramesh Chandra, Ben Pf...