Sciweavers

1937 search results - page 325 / 388
» Virtual networking
Sort
View
150
Voted
EUROSYS
2006
ACM
16 years 26 days ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
137
Voted
SAC
2010
ACM
15 years 10 months ago
A business driven cloud optimization architecture
In this paper, we discuss several facets of optimization in cloud computing, the corresponding challenges and propose an architecture for addressing those challenges. We consider ...
Marin Litoiu, C. Murray Woodside, Johnny Wong, Joa...
SC
2009
ACM
15 years 10 months ago
Allocator implementations for network-on-chip routers
The present contribution explores the design space for virtual channel (VC) and switch allocators in network-on-chip (NoC) routers. Based on detailed RTL-level implementations, we...
Daniel U. Becker, William J. Dally
119
Voted
DSN
2009
IEEE
15 years 10 months ago
Fast memory state synchronization for virtualization-based fault tolerance
Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating syst...
Maohua Lu, Tzi-cker Chiueh
131
Voted
WCNC
2008
IEEE
15 years 10 months ago
Subspace Blind MIMO-OFDM Channel Estimation with Short Averaging Periods: Performance Analysis
—Among all blind channel estimation problems, subspace-based algorithms are attractive due to its fastconverging nature. It primarily exploits the orthogonality structure of the ...
Chao-Cheng Tu, Benoît Champagne