Sciweavers

832 search results - page 17 / 167
» Effect of Malicious Synchronization
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
ATAL
2006
Springer
13 years 11 months ago
Effect of deceptive referrals on system stability
We study the problem of agents attempting to find quality service providers in a distributed environment. While referrals from other agents can be used to locate high-quality prov...
Ikpeme Erete, Teddy Candale, Sandip Sen
CSSE
2008
IEEE
13 years 11 months ago
JThreadSpy: A Tool for Improving the Effectiveness of Concurrent System Teaching and Learning
Both teaching and learning multithreaded ing are complex tasks, due to the abstraction of the concepts, the non-determinism of the scheduler, the impossibility of using classical s...
Giovanni Malnati, Caterina Maria Cuva, Claudia Bar...
ASPLOS
2011
ACM
13 years 1 months ago
Hybrid NOrec: a case study in the effectiveness of best effort hardware transactional memory
Transactional memory (TM) is a promising synchronization mechanism for the next generation of multicore processors. Best-effort Hardware Transactional Memory (HTM) designs, such a...
Luke Dalessandro, François Carouge, Sean Wh...
P2P
2006
IEEE
130views Communications» more  P2P 2006»
14 years 3 months ago
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough