Sciweavers

155 search results - page 13 / 31
» Flexible Aliasing with Protection
Sort
View
TRIDENTCOM
2010
IEEE
13 years 5 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
CAV
2010
Springer
161views Hardware» more  CAV 2010»
13 years 11 months ago
Directed Proof Generation for Machine Code
We present the algorithms used in MCVETO (Machine-Code VErification TOol), a tool to check whether a stripped machinecode program satisfies a safety property. The verification p...
Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda B...
PCM
2007
Springer
132views Multimedia» more  PCM 2007»
14 years 1 months ago
Priority Ordering and Packetization for Scalable Video Multicast with Network Coding
The integration of scalable video representation and network coding (NC) offers an excellent solution to robust and flexible video multicast over IP networks. In this work, we exam...
Song Xiao, Hui Wang, C. C. Jay Kuo
ISBI
2008
IEEE
14 years 8 months ago
Improved IDQC reconstruction for inhomogeneity corrected MR spectroscopy
In this paper, we focus on the reconstruction of iDQC MR spectroscopy data. Unlike standard 1-D MR spectroscopy schemes, iDQC acquires 2-D spectral data to decouple the magnetic f...
Rohini Shankar, Tianliang Gu, Jianhui Zhong, Mathe...
OSDI
1996
ACM
13 years 9 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...