Sciweavers

45 search results - page 7 / 9
» Virtual Memory Primitives for User Programs
Sort
View
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
15 years 4 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
114
Voted
ASPLOS
2008
ACM
15 years 8 days ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
98
Voted
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
15 years 4 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
93
Voted
VRML
2000
ACM
15 years 2 months ago
3D behavioral model design for simulation and software engineering
Modeling is used to build structures that serve as surrogates for other objects. As children, we learn to model at a very young age. An object such as a small toy train teaches us...
Paul A. Fishwick
142
Voted
HCI
2011
14 years 1 months ago
Body Buddies: Social Signaling through Puppeteering
While virtual worlds have evolved to provide a good medium for social communication, they are very primitive in their social and affective communication design. The social communic...
Magy Seif El-Nasr, Katherine Isbister, Jeffery Ven...