Sciweavers

3531 search results - page 179 / 707
» Virtualizing Disk Performance
Sort
View
EUROSYS
2006
ACM
16 years 2 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
202
Voted
CASES
2004
ACM
15 years 10 months ago
Memory overflow protection for embedded systems using run-time checks, reuse and compression
Title of thesis: MEMORY OVERFLOW PROTECTION FOR EMBEDDED SYSTEMS USING RUN-TIME CHECKS, REUSE AND COMPRESSION Surupa Biswas, Master of Science, 2004 Thesis directed by: Assistant ...
Surupa Biswas, Matthew Simpson, Rajeev Barua
149
Voted
MM
2003
ACM
125views Multimedia» more  MM 2003»
15 years 10 months ago
Essistants
One of the challenges the service providers currently face is the ability to introduce a variety of services at a minimal cost and impact to their customers. These services often ...
Christos Tryfonas, James Schumacher
154
Voted
USENIX
2001
15 years 6 months ago
User-Level Checkpointing for LinuxThreads Programs
Multiple threads running in a single, shared address space is a simple model for writing parallel programs for symmetric multiprocessor (SMP) machines and for overlapping I/O and ...
William R. Dieter, James E. Lumpp Jr.
ICIP
2009
IEEE
16 years 6 months ago
On Clinical Validation Of Fly-over Visualization Technique For Virtual Colonoscopy
In this paper, we aim to provide the further evaluation on the recently proposed visualization technique known as Virtual Fly-Over for virtual colonoscopy by using clinical CT col...