Sciweavers

379 search results - page 29 / 76
» High-performance operating system controlled memory compress...
Sort
View
134
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 2 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
SOSP
2001
ACM
15 years 11 months ago
Information and Control in Gray-Box Systems
In modern systems, developers are often unable to modify the underlying operating system. To build services in such an environment, we advocate the use of gray-box techniques. Whe...
Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
ICSR
2000
Springer
15 years 6 months ago
A New Control Structure for Transformation-Based Generators
A serious problem of most transformation-based generators is that they are trying to achieve three mutually antagonistic goals simultaneously: 1) deeply factored operators and oper...
Ted J. Biggerstaff
137
Voted
DAC
2007
ACM
16 years 3 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
115
Voted
OSDI
1996
ACM
15 years 3 months ago
Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications
Current operating systems offer poor performance when a numeric application's working set does not fit in main memory. As a result, programmers who wish to solve "out-of...
Todd C. Mowry, Angela K. Demke, Orran Krieger