Sciweavers

209 search results - page 35 / 42
» Ensuring operating system kernel integrity with OSck
Sort
View
EMSOFT
2003
Springer
14 years 29 days ago
Event Correlation: Language and Semantics
Abstract. Event correlation is a service provided by middleware platforms that allows components in a publish/subscribe architecture to subscribe to patterns of events rather than ...
César Sánchez, Sriram Sankaranarayan...
DAIS
2006
13 years 9 months ago
Using Speculative Push for Unnecessary Checkpoint Creation Avoidance
Abstract. This paper discusses a way of incorporating speculation techniques into Distributed Shared Memory (DSM) systems with checkpointing mechanism without creating unnecessary ...
Arkadiusz Danilecki, Michal Szychowiak
USS
2008
13 years 10 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
MOBISYS
2007
ACM
14 years 7 months ago
Experiences of designing and deploying intelligent sensor nodes to monitor hand-arm vibrations in the field
The NEMO project is exploring the use of mobile sensor nodes to augment physical work artefacts in order to ensure compliance with health and safety regulations. In this paper we ...
Christos Efstratiou, Nigel Davies, Gerd Kortuem, J...
SIGOPS
2008
306views more  SIGOPS 2008»
13 years 7 months ago
virtio: towards a de-facto standard for virtual I/O devices
The Linux Kernel currently supports at least 8 distinct virtualization systems: Xen, KVM, VMware's VMI, IBM's System p, IBM's System z, User Mode Linux, lguest and ...
Rusty Russell