Sciweavers

1147 search results - page 204 / 230
» Virtualizing Transactional Memory
Sort
View
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 7 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
IPPS
2007
IEEE
15 years 7 months ago
Towards A Better Understanding of Workload Dynamics on Data-Intensive Clusters and Grids
This paper presents a comprehensive statistical analysis of workloads collected on data-intensive clusters and Grids. The analysis is conducted at different levels, including Virt...
Hui Li, Lex Wolters
ISCAS
2007
IEEE
103views Hardware» more  ISCAS 2007»
15 years 7 months ago
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents
— Digital fountain codes are becoming increasingly important for multimedia communications over networks subject to packet erasures. These codes have significantly lower complex...
Mattia C. O. Bogino, Pasquale Cataldi, Marco Grang...
ADHOCNOW
2007
Springer
15 years 7 months ago
Routing in Wireless Networks with Position Trees
Sensor networks are wireless adhoc networks where all the nodes cooperate for routing messages in the absence of a fixed infrastructure. Non-flooding, guaranteed delivery routing...
Edgar Chávez, Nathalie Mitton, Hécto...
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
15 years 7 months ago
Predicting Secret Keys Via Branch Prediction
This paper announces a new software side-channel attack — enabled by the branch prediction capability common to all modern highperformance CPUs. The penalty paid (extra clock cyc...
Onur Aciiçmez, Çetin Kaya Koç...