Sciweavers

312 search results - page 56 / 63
» Customization in a UNIX Computing Environment
Sort
View
SIGUCCS
2005
ACM
14 years 1 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
EUROPAR
2003
Springer
14 years 1 months ago
KOJAK - A Tool Set for Automatic Performance Analysis of Parallel Programs
Abstract. Today’s parallel computers with SMP nodes provide both multithreading and message passing as their modes of parallel execution. As a consequence, performance analysis a...
Bernd Mohr, Felix Wolf
NSDI
2010
13 years 9 months ago
Mugshot: Deterministic Capture and Replay for JavaScript Applications
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay past executions of web applications. Replay is us...
James Mickens, Jeremy Elson, Jon Howell
ACSAC
2007
IEEE
14 years 2 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
SAC
2006
ACM
14 years 1 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...