Sciweavers

8493 search results - page 1622 / 1699
» Implementing a distributed firewall
Sort
View
118
Voted
EUROSYS
2010
ACM
15 years 7 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
PLDI
2010
ACM
15 years 7 months ago
Smooth interpretation
We present smooth interpretation, a method to systematically approximate numerical imperative programs by smooth mathematical functions. This approximation facilitates the use of ...
Swarat Chaudhuri, Armando Solar-Lezama
88
Voted
APSEC
2002
IEEE
15 years 7 months ago
A Virtual File System for Source Program Editing
In this paper, we propose a virtual file system, “SPDFS,” which provides global declarations in source programs as virtual files to programmers. Global declarations means ob...
Yoshida Atsushi, Fukuyasu Naoki
118
Voted
COOPIS
2002
IEEE
15 years 7 months ago
Empirical Differences between COTS Middleware Scheduling Strategies
The proportion of complex distributed real-time embedded (DRE) systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly in response to...
Christopher D. Gill, Fred Kuhns, Douglas C. Schmid...
106
Voted
HICSS
2002
IEEE
127views Biometrics» more  HICSS 2002»
15 years 7 months ago
Weaving Community with Community Fibre: Community Informatics and the Broadband Revolution
Unexpectedly, the widespread availability of very very high speed (Broadband) bandwidth into communities and within large centres has become not only a long-term possibility but a...
Michael Gurstein
« Prev « First page 1622 / 1699 Last » Next »