Sciweavers

1816 search results - page 55 / 364
» Trace oblivious computation
Sort
View
NDSS
2005
IEEE
15 years 4 months ago
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities
Most Windows users run all the time with Admin privileges. This significantly increases the vulnerability of Windows systems because the compromise of any user-level application ...
Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wa...
IPPS
1999
IEEE
15 years 3 months ago
Dynamically Scheduling the Trace Produced During Program Execution into VLIW Instructions
VLIW machines possibly provide the most direct way to exploit instruction level parallelism; however, they cannot be used to emulate current general-purpose instruction set archit...
Alberto Ferreira de Souza, Peter Rounce
IPPS
2007
IEEE
15 years 5 months ago
Automatic Trace-Based Performance Analysis of Metacomputing Applications
The processing power and memory capacity of independent and heterogeneous parallel machines can be combined to form a single parallel system that is more powerful than any of its ...
Daniel Becker, Felix Wolf, Wolfgang Frings, Markus...
CSIE
2009
IEEE
15 years 5 months ago
A Metamodel for Tracing Non-functional Requirements
The tendency for Non-Functional Requirements (NFRs) to have a wide-ranging impact on a software system, and the strong interdependencies and tradeoffs that exist between NFRs and ...
Mohamad Kassab, Olga Ormandjieva, Maya Daneva
DSN
2009
IEEE
15 years 5 months ago
Report generation for simulation traces with Traviando
Any model-based evaluation of the dependability of a system requires validation and verification to justify that its results are meaningful. Modern modeling frameworks enable us ...
Peter Kemper