Sciweavers

853 search results - page 165 / 171
» Delimited Continuations in Operating Systems
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
VTC
2008
IEEE
141views Communications» more  VTC 2008»
14 years 4 months ago
Mobile WiMAX: Performance Analysis and Comparison with Experimental Results
— The demand for broadband mobile services continues to grow. Conventional high-speed broadband solutions are based on wired-access technologies such as digital subscriber line (...
Mai Tran, George Zaggoulos, Andrew R. Nix, Angela ...
LCPC
2007
Springer
14 years 3 months ago
Pillar: A Parallel Implementation Language
Abstract. As parallelism in microprocessors becomes mainstream, new programming languages and environments are emerging to meet the challenges of parallel programming. To support r...
Todd Anderson, Neal Glew, Peng Guo, Brian T. Lewis...
ISSTA
2006
ACM
14 years 3 months ago
An empirical study of the robustness of MacOS applications using random testing
We report on the fourth in a series of studies on the reliability of application programs in the face of random input. Over the previous 15 years, we have studied the reliability ...
Barton P. Miller, Gregory Cooksey, Fredrick Moore
IPPS
2005
IEEE
14 years 3 months ago
Fault-Tolerant Parallel Applications with Dynamic Parallel Schedules
Commodity computer clusters are often composed of hundreds of computing nodes. These generally off-the-shelf systems are not designed for high reliability. Node failures therefore...
Sebastian Gerlach, Roger D. Hersch