Sciweavers

883 search results - page 162 / 177
» The RETOS operating system: kernel, tools and applications
Sort
View
CCS
2008
ACM
14 years 11 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
FAST
2010
15 years 1 days ago
BASIL: Automated IO Load Balancing Across Storage Devices
Live migration of virtual hard disks between storage arrays has long been possible. However, there is a dearth of online tools to perform automated virtual disk placement and IO l...
Ajay Gulati, Chethan Kumar, Irfan Ahmad, Karan Kum...
LCPC
2005
Springer
15 years 3 months ago
Supporting SELL for High-Performance Computing
We briefly introduce the notion of Semantically Enhanced Library Languages, SELL, as a practical and economical alternative to special-purpose programming languages for high-perfo...
Bjarne Stroustrup, Gabriel Dos Reis
PPOPP
2010
ACM
15 years 7 months ago
Is transactional programming actually easier?
Chip multi-processors (CMPs) have become ubiquitous, while tools that ease concurrent programming have not. The promise of increased performance for all applications through ever ...
Christopher J. Rossbach, Owen S. Hofmann, Emmett W...
CCS
2008
ACM
14 years 11 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...