Sciweavers

1448 search results - page 274 / 290
» Deadlock Detection in Distributed Systems
Sort
View
HPCA
2006
IEEE
14 years 8 months ago
BulletProof: a defect-tolerant CMP switch architecture
As silicon technologies move into the nanometer regime, transistor reliability is expected to wane as devices become subject to extreme process variation, particle-induced transie...
Kypros Constantinides, Stephen Plaza, Jason A. Blo...
IMC
2009
ACM
14 years 2 months ago
Impact of transient CSMA/CA access delays on active bandwidth measurements
WLAN devices based on CSMA/CA access schemes have become a fundamental component of network deployments. In such wireless scenarios, traditional networking applications, tools, an...
Marc Portoles-Comeras, Albert Cabellos-Aparicio, J...
ACSAC
2006
IEEE
14 years 1 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
ASPLOS
2006
ACM
14 years 1 months ago
Ultra low-cost defect protection for microprocessor pipelines
The sustained push toward smaller and smaller technology sizes has reached a point where device reliability has moved to the forefront of concerns for next-generation designs. Sil...
Smitha Shyam, Kypros Constantinides, Sujay Phadke,...
GRID
2005
Springer
14 years 1 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney