Sciweavers

492 search results - page 56 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
P2P
2008
IEEE
149views Communications» more  P2P 2008»
14 years 2 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
OSDI
2008
ACM
14 years 8 months ago
Hunting for Problems with Artemis
Artemis is a modular application designed for analyzing and troubleshooting the performance of large clusters running datacenter services. Artemis is composed of four modules: (1)...
Gabriela F. Cretu-Ciocarlie, Mihai Budiu, Mois&eac...
USENIX
2008
13 years 10 months ago
Protection Strategies for Direct Access to Virtualized I/O Devices
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory ma...
Paul Willmann, Scott Rixner, Alan L. Cox
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 1 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
ROBIO
2006
IEEE
120views Robotics» more  ROBIO 2006»
14 years 1 months ago
Event Based Methodology for SuperMedia Enhanced Teleoperation
- SuperMedia provides human operators rich environmental information, thus providing telepresence and enhances efficiency of operation. However, coupling human with the remote envi...
Yang Liu, Amit Goradia, Yonghui Xue, Ning Xi