Sciweavers

883 search results - page 107 / 177
» The RETOS operating system: kernel, tools and applications
Sort
View
ICISS
2010
Springer
14 years 8 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
IISWC
2008
IEEE
15 years 4 months ago
Evaluating the impact of dynamic binary translation systems on hardware cache performance
Dynamic binary translation systems enable a wide range of applications such as program instrumentation, optimization, and security. DBTs use a software code cache to store previou...
Arkaitz Ruiz-Alvarez, Kim M. Hazelwood
PDP
2007
IEEE
15 years 4 months ago
RealPeer--A Framework for Simulation-Based Development of Peer-to-Peer Systems
In the process of developing P2P systems simulation has proved to be an essential tool for the evaluation of existing and conceived P2P systems. So far, in practice there has been...
Dieter Hildebrandt, Ludger Bischofs, Wilhelm Hasse...
FM
2006
Springer
126views Formal Methods» more  FM 2006»
15 years 1 months ago
Towards Modularized Verification of Distributed Time-Triggered Systems
Abstract. The correctness of a system according to a given specification is essential, especially for safety-critical applications. One such typical application domain is the autom...
Jewgenij Botaschanjan, Alexander Gruler, Alexander...
COOPIS
2000
IEEE
15 years 2 months ago
Benchmarking and Configuration of Workflow Management Systems
Workflow management systems (WFMS) are a cornerstone of mission-criticial, possibly cross-organizational business processes. For largescale applications both their performance and ...
Michael Gillmann, Ralf Mindermann, Gerhard Weikum