Sciweavers

2814 search results - page 49 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
BCS
2008
15 years 5 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
254
Voted
SAC
2010
ACM
15 years 11 months ago
Maintaining data reliability without availability in P2P storage systems
Peer-to-peer (P2P) storage is a promising technology to provide users with cheap and online persistence. However, due the instability of these infrastructures, P2P storage systems...
Lluis Pamies-Juarez, Pedro García Ló...
EMSOFT
2009
Springer
15 years 11 months ago
Adding aggressive error correction to a high-performance compressing flash file system
While NAND flash memories have rapidly increased in both capacity and performance and are increasingly used as a storage device in many embedded systems, their reliability has de...
Yangwook Kang, Ethan L. Miller
IDMS
1997
Springer
97views Multimedia» more  IDMS 1997»
15 years 8 months ago
A Soft Real Time Scheduling Server in UNIX Operating System
We present a soft real-time CPU server for Continuous Media processing in the UNIX environment. The server is a daemon process from which applications can request and acquire soft...
Hao-Hua Chu, Klara Nahrstedt
DATE
2008
IEEE
114views Hardware» more  DATE 2008»
15 years 11 months ago
Operating System Controlled Processor-Memory Bus Encryption
—Unencrypted data appearing on the processor– memory bus can result in security violations, e.g., allowing attackers to gather keys to financial accounts and personal data. Al...
Xi Chen, Robert P. Dick, Alok N. Choudhary