Sciweavers

8493 search results - page 1622 / 1699
» Implementing a distributed firewall
Sort
View
EUROSYS
2010
ACM
14 years 3 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
PLDI
2010
ACM
14 years 3 months ago
Smooth interpretation
We present smooth interpretation, a method to systematically approximate numerical imperative programs by smooth mathematical functions. This approximation facilitates the use of ...
Swarat Chaudhuri, Armando Solar-Lezama
APSEC
2002
IEEE
14 years 3 months ago
A Virtual File System for Source Program Editing
In this paper, we propose a virtual file system, “SPDFS,” which provides global declarations in source programs as virtual files to programmers. Global declarations means ob...
Yoshida Atsushi, Fukuyasu Naoki
COOPIS
2002
IEEE
14 years 3 months ago
Empirical Differences between COTS Middleware Scheduling Strategies
The proportion of complex distributed real-time embedded (DRE) systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly in response to...
Christopher D. Gill, Fred Kuhns, Douglas C. Schmid...
HICSS
2002
IEEE
127views Biometrics» more  HICSS 2002»
14 years 3 months ago
Weaving Community with Community Fibre: Community Informatics and the Broadband Revolution
Unexpectedly, the widespread availability of very very high speed (Broadband) bandwidth into communities and within large centres has become not only a long-term possibility but a...
Michael Gurstein
« Prev « First page 1622 / 1699 Last » Next »