Sciweavers

171 search results - page 29 / 35
» Improving Computer Security Using Extended Static Checking
Sort
View
CCGRID
2004
IEEE
13 years 10 months ago
A resource allocation architecture with support for interactive sessions in utility Grids
Utility Grids implemenf a virtuuliiarion architecture and nl- lowfor sharing of infrastructure for improved Rerum on invesrmenr(RO1J.Wc consider extending the existing Grid infrus...
Vanish Talwar, Bikash Agarwalla, Sujoy Basu, Raj K...
ICS
2009
Tsinghua U.
14 years 1 months ago
Adagio: making DVS practical for complex HPC applications
Power and energy are first-order design constraints in high performance computing. Current research using dynamic voltage scaling (DVS) relies on trading increased execution time...
Barry Rountree, David K. Lowenthal, Bronis R. de S...
DSN
2011
IEEE
12 years 6 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...
ICITA
2005
IEEE
14 years 9 days ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
PASTE
2005
ACM
14 years 8 days ago
Low overhead program monitoring and profiling
Program instrumentation, inserted either before or during execution, is rapidly becoming a necessary component of many systems. Instrumentation is commonly used to collect informa...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa