Sciweavers

492 search results - page 4 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
HPCA
2011
IEEE
12 years 10 months ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
MICRO
2009
IEEE
120views Hardware» more  MICRO 2009»
14 years 1 months ago
Tribeca: design for PVT variations with local recovery and fine-grained adaptation
With continued advances in CMOS technology, parameter variations are emerging as a major design challenge. Irregularities during the fabrication of a microprocessor and variations...
Meeta Sharma Gupta, Jude A. Rivers, Pradip Bose, G...
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
12 years 10 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
PAMI
2011
13 years 1 months ago
View-Independent Action Recognition from Temporal Self-Similarities
— This paper addresses recognition of human actions under view changes. We explore self-similarities of action sequences over time and observe the striking stability of such meas...
Imran N. Junejo, Emilie Dexter, Ivan Laptev, Patri...
SIGMOD
2002
ACM
91views Database» more  SIGMOD 2002»
14 years 7 months ago
Phoenix Project: Fault-Tolerant Applications
After a system crash, databases recover to the last committed transaction, but applications usually either crash or cannot continue. The Phoenix purpose is to enable application s...
Roger S. Barga, David B. Lomet