Sciweavers

741 search results - page 81 / 149
» Abstract Machines for Communication Security
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
No more middlebox: integrate processing into network
Traditionally, in-network services like firewall, proxy, cache, and transcoders have been provided by dedicated hardware middleboxes. A recent trend has been to remove the middleb...
Jeongkeun Lee, Jean Tourrilhes, Puneet Sharma, Suj...
PROCEDIA
2010
148views more  PROCEDIA 2010»
13 years 4 months ago
SysCellC: a data-flow programming model on multi-GPU
High performance computing with low cost machines becomes a reality with GPU. Unfortunately, high performances are achieved when the programmer exploits the architectural specific...
Dominique Houzet, Sylvain Huet, Anis Rahman
ASPLOS
2012
ACM
12 years 5 months ago
ELI: bare-metal performance for I/O virtualization
Direct device assignment enhances the performance of guest virtual machines by allowing them to communicate with I/O devices without host involvement. But even with device assignm...
Abel Gordon, Nadav Amit, Nadav Har'El, Muli Ben-Ye...
POPL
2004
ACM
14 years 10 months ago
A bisimulation for dynamic sealing
We define seal, an untyped call-by-value -calculus with primitives for protecting abstract data by sealing, and develop a bisimulation proof method that is sound and complete with...
Eijiro Sumii, Benjamin C. Pierce
IEEEARES
2009
IEEE
14 years 4 months ago
A Framework for Understanding Botnets
Botnets have become a severe threat to the cyberspace. However, existing studies are typically conducted in an ad hoc fashion, by demonstrating specific analysis on captured bot ...
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu