Sciweavers

15777 search results - page 2807 / 3156
» The Reformulation-Optimization Software Engine
Sort
View
168
Voted
EUROSYS
2010
ACM
16 years 1 months ago
Kivati: Fast Detection and Prevention of Atomicity Violations
Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violat...
Lee Chew, David Lie
EUROSYS
2009
ACM
16 years 1 months ago
First-aid: surviving and preventing memory management bugs during production runs
Memory bugs in C/C++ programs severely affect system availability and security. This paper presents First-Aid, a lightweight runtime system that survives software failures caused ...
Qi Gao, Wenbin Zhang, Yan Tang, Feng Qin
138
Voted
EUROSYS
2008
ACM
16 years 1 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
145
Voted
EUROSYS
2008
ACM
16 years 1 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
142
Voted
EUROSYS
2008
ACM
16 years 1 months ago
GreenFS: making enterprise computers greener by protecting them better
Hard disks contain data—frequently an irreplaceable asset of high monetary and non-monetary value. At the same time, hard disks are mechanical devices that consume power, are no...
Nikolai Joukov, Josef Sipek
« Prev « First page 2807 / 3156 Last » Next »