Sciweavers

1147 search results - page 227 / 230
» Virtualizing Transactional Memory
Sort
View
ASPLOS
2006
ACM
15 years 1 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
91
Voted
ASPLOS
2006
ACM
15 years 1 months ago
Integrated network interfaces for high-bandwidth TCP/IP
This paper proposes new network interface controller (NIC) designs that take advantage of integration with the host CPU to provide increased flexibility for operating system kerne...
Nathan L. Binkert, Ali G. Saidi, Steven K. Reinhar...
83
Voted
USENIX
2008
14 years 11 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox
IE
2007
14 years 11 months ago
Through the looking glass: game worlds as representations and views from elsewhere
This paper describes the rationale and subsequent development stages of a work in progress: a graffiti toolkit for rich spatial 3D environments and an actual world mnemonic collec...
J. Turner, Nicola J. Bidwell
HCI
2007
14 years 11 months ago
User Expectations from Dictation on Mobile Devices
Mobile phones, with their increasing processing power and memory, are enabling a diversity of tasks. The traditional text entry method using keypad is falling short in numerous way...
Santosh Basapur, Shuang Xu, Mark Ahlenius, Young S...