Sciweavers

768 search results - page 121 / 154
» Data Movement in Kernelized Systems
Sort
View
TSE
1998
93views more  TSE 1998»
13 years 10 months ago
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
An important step in the development of dependable systems is the validation of their fault tolerance properties. Fault injection has been widely used for this purpose, however wi...
Joao Carreira, Henrique Madeira, João Gabri...
COLING
2010
13 years 5 months ago
Cloud Computing for Linguists
The system presented is a web application designed to aid linguistic research with data collection and online publishing. It is a service mainly for linguists and language experts...
Dorothee Beermann, Pavel Mihaylov
PDPTA
2008
13 years 11 months ago
A GridFTP Transport Driver for Globus XIO
GridFTP is a high-performance, reliable data transfer protocol optimized for high-bandwidth wide-area networks. Based on the Internet FTP protocol, it defines extensions for highp...
Rajkumar Kettimuthu, Wantao Liu, Joseph M. Link, J...
CCS
2009
ACM
14 years 5 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
CODES
2005
IEEE
14 years 3 months ago
Aggregating processor free time for energy reduction
Even after carefully tuning the memory characteristics to the application properties and the processor speed, during the execution of real applications there are times when the pr...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...