Sciweavers

987 search results - page 135 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
SOSP
1993
ACM
13 years 10 months ago
Protection Traps and Alternatives for Memory Management of an Object-Oriented Language
Many operating systems allow user programs to specify the protectionlevel (inaccessible, read-only, read-write) of pages in their virtual memory address space, and to handle any p...
Antony L. Hosking, J. Eliot B. Moss
JSSPP
1997
Springer
14 years 1 months ago
PScheD: Political Scheduling on the CRAY T3E
Large parallel processing environments present serious administrative challenges if high utilization of the available resources is a goal. In many cases there is also the need to ...
Richard N. Lagerstrom, Stephan K. Gipp
ISCA
2012
IEEE
281views Hardware» more  ISCA 2012»
11 years 11 months ago
LOT-ECC: Localized and tiered reliability mechanisms for commodity memory systems
Memory system reliability is a serious and growing concern in modern servers. Existing chipkill-level memory protection mechanisms suffer from several drawbacks. They activate a l...
Aniruddha N. Udipi, Naveen Muralimanohar, Rajeev B...
ISCAS
2002
IEEE
153views Hardware» more  ISCAS 2002»
14 years 1 months ago
Biological learning modeled in an adaptive floating-gate system
We have implemented an aspect of learning and memory in the nervous system using analog electronics. Using a simple synaptic circuit we realize networks with Hebbian type adaptati...
Christal Gordon, Paul E. Hasler
FPL
2004
Springer
171views Hardware» more  FPL 2004»
14 years 2 months ago
A Modular System for FPGA-Based TCP Flow Processing in High-Speed Networks
Field Programmable Gate Arrays (FPGAs) can be used in Intrusion Prevention Systems (IPS) to inspect application data contained within network flows. An IPS operating on high-speed...
David V. Schuehler, John W. Lockwood