Sciweavers

340 search results - page 55 / 68
» The Potential of Carbon-Based Memory Systems
Sort
View
ACSAC
2002
IEEE
15 years 6 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ICPADS
2010
IEEE
14 years 11 months ago
Data-Aware Task Scheduling on Multi-accelerator Based Platforms
To fully tap into the potential of heterogeneous machines composed of multicore processors and multiple accelerators, simple offloading approaches in which the main trunk of the ap...
Cédric Augonnet, Jérôme Clet-O...
120
Voted
DIMVA
2009
15 years 2 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
92
Voted
WSC
2004
15 years 3 months ago
Integration of the FreeBSD TCP/IP-Stack into the Discrete Event Simulator OMNet++
The discrete event simulator OMNeT++, that is programmed in C++, shows a steady growing popularity. Due to its wellstructured nature, it is easy to understand and easy to use. A s...
Roland Bless, Mark Doll
127
Voted
POPL
2000
ACM
15 years 5 months ago
Resource Bound Certification
Various code certification systems allow the certification and static verification of important safety properties such as memory and control-flow safety. These systems are valuabl...
Karl Crary, Stephanie Weirich