Sciweavers

209 search results - page 19 / 42
» Ensuring operating system kernel integrity with OSck
Sort
View
USS
2008
13 years 10 months ago
Selective Versioning in a Secure Disk System
Making vital disk data recoverable even in the event of OS compromises has become a necessity, in view of the increased prevalence of OS vulnerability exploits over the recent yea...
Swaminathan Sundararaman, Gopalan Sivathanu, Erez ...
IAT
2007
IEEE
14 years 2 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
PDPTA
2000
13 years 9 months ago
The PODOS File System - Exploiting the High-Speed Communication Subsystem
Performance Oriented Distributed Operating System (PODOS) is a clustering environment, being built on a monolithic Linux kernel. PODOS augments very few components to the Linux ke...
Sudharshan Vazhkudai, P. Tobin Maginnis
OSDI
2004
ACM
14 years 8 months ago
Deploying Safe User-Level Network Services with icTCP
We present icTCP, an "information and control" TCP implementation that exposes key pieces of internal TCP state and allows certain TCP variables to be set in a safe fash...
Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 7 months ago
Ni-MH battery modelling for ambient intelligence applications
Mobile devices, like sensor networks and MEMS actuators use mobile power supplies to ensure energy for their operation. These are mostly batteries. The lifetime of the devices dep...
Domonkos Szente-Varga, Gyula Horvath, Márta...