Sciweavers

12697 search results - page 2410 / 2540
» Call for Papers
Sort
View
129
Voted
FAST
2008
15 years 5 months ago
Improving I/O Performance of Applications through Compiler-Directed Code Restructuring
Ever-increasing complexity of large-scale applications and continuous increases in sizes of the data they process make the problem of maximizing performance of such applications a...
Mahmut T. Kandemir, Seung Woo Son, Mustafa Karak&o...
USENIX
2007
15 years 5 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
164
Voted
MOBISYS
2008
ACM
15 years 5 months ago
Community sensor grids: virtualization for sharing across domains
Wireless sensor networks have been traditionally designed to be privately owned and used. Hence the two hallmark features of sensor networks, namely customized network application...
Amiya Bhattacharya, Meddage S. Fernando, Partha Da...
NSDI
2008
15 years 5 months ago
Phalanx: Withstanding Multimillion-Node Botnets
Large-scale distributed denial of service (DoS) attacks are an unfortunate everyday reality on the Internet. They are simple to execute and with the growing prevalence and size of...
Colin Dixon, Thomas E. Anderson, Arvind Krishnamur...
139
Voted
USENIX
2008
15 years 5 months ago
Idle Read After Write - IRAW
Despite a low occurrence rate, silent data corruption represents a growing concern for storage systems designers. Throughout the storage hierarchy, from the file system down to th...
Alma Riska, Erik Riedel
« Prev « First page 2410 / 2540 Last » Next »