Sciweavers

155 search results - page 20 / 31
» This Side Up!
Sort
View
PLDI
2000
ACM
15 years 1 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
CCS
2000
ACM
15 years 1 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
ICRA
1998
IEEE
77views Robotics» more  ICRA 1998»
15 years 1 months ago
The Roles of Shape and Motion in Dynamic Manipulation: the Butterfly Example
We are studying a juggler's skill called the "butterfly." Startingwith a ball resting on the palm of his/her open hand, a skilled juggler can accelerate and shape h...
Kevin M. Lynch, Naoji Shiroma, Hirohiko Arai, Kazu...
MICRO
1998
IEEE
75views Hardware» more  MICRO 1998»
15 years 1 months ago
Improving Prediction for Procedure Returns with Return-address-stack Repair Mechanisms
This paper evaluates several mechanisms for repairing the return-address stack after branch mispredictions. The return-address stack is a small but important structure for achievi...
Kevin Skadron, Pritpal S. Ahuja, Margaret Martonos...
CLUSTER
2008
IEEE
14 years 11 months ago
Improving message passing over Ethernet with I/OAT copy offload in Open-MX
Abstract--Open-MX is a new message passing layer implemented on top of the generic Ethernet stack of the Linux kernel. Open-MX works on all Ethernet hardware, but it suffers from e...
Brice Goglin