Sciweavers

4305 search results - page 234 / 861
» Analysing Protocol Implementations
Sort
View
USS
2010
13 years 7 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
DSN
2011
IEEE
12 years 9 months ago
Transparent dynamic binding with fault-tolerant cache coherence protocol for chip multiprocessors
—Aggressive technology scaling causes chip multiprocessors increasingly error-prone. Core-level faulttolerant approaches bind two cores to implement redundant execution and error...
Shuchang Shan, Yu Hu, Xiaowei Li
EUROPAR
1998
Springer
14 years 1 months ago
Exploiting Atomic Broadcast in Replicated Databases
Database replication protocols have historically been built on top of distributed database systems, and have consequently been designed and implemented using distributed transacti...
Fernando Pedone, Rachid Guerraoui, André Sc...
CAV
2009
Springer
171views Hardware» more  CAV 2009»
14 years 10 months ago
CalFuzzer: An Extensible Active Testing Framework for Concurrent Programs
Active testing has recently been introduced to effectively test concurrent programs. Active testing works in two phases. It first uses predictive off-the-shelf static or dynamic pr...
Pallavi Joshi, Mayur Naik, Chang-Seo Park, Koushik...
ICDE
2010
IEEE
183views Database» more  ICDE 2010»
14 years 4 months ago
Estimating the compression fraction of an index using sampling
—Data compression techniques such as null suppression and dictionary compression are commonly used in today’s database systems. In order to effectively leverage compression, it...
Stratos Idreos, Raghav Kaushik, Vivek R. Narasayya...