Sciweavers

209 search results - page 9 / 42
» Ensuring operating system kernel integrity with OSck
Sort
View
COLING
2008
13 years 9 months ago
Coreference Systems Based on Kernels Methods
Various types of structural information e.g., about the type of constructions in which binding constraints apply, or about the structure of names - play a central role in corefere...
Yannick Versley, Alessandro Moschitti, Massimo Poe...
MICRO
2008
IEEE
162views Hardware» more  MICRO 2008»
13 years 7 months ago
MetaTM/TxLinux: Transactional Memory for an Operating System
This paper quantifies the effect of architectural design decisions on the performance of TxLinux. TxLinux is a Linux kernel modified to use transactions in place of locking primit...
Hany E. Ramadan, Christopher J. Rossbach, Donald E...
CGA
2005
13 years 7 months ago
A Novel Monte Carlo Noise Reduction Operator
A novel Monte Carlo noise reduction operator is proposed in this paper. We apply and extend the standard bilateral filtering method and build a new local adaptive noise reduction k...
Ruifeng Xu, Sumanta N. Pattanaik
ENTCS
2008
94views more  ENTCS 2008»
13 years 7 months ago
A Formal Model of Memory Peculiarities for the Verification of Low-Level Operating-System Code
This paper presents our solutions to some problems we encountered in an ongoing attempt to verify the micro-hypervisor currently developed within the Robin project. The problems t...
Hendrik Tews, Tjark Weber, Marcus Völp
CCS
2009
ACM
14 years 2 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...