Sciweavers

9518 search results - page 1849 / 1904
» On Mobility of Software Processes
Sort
View
CSFW
2008
IEEE
14 years 3 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
HPDC
2008
IEEE
14 years 3 months ago
XenLoop: a transparent high performance inter-vm network loopback
Advances in virtualization technology have focused mainly on strengthening the isolation barrier between virtual machines (VMs) that are co-resident within a single physical machi...
Jian Wang, Kwame-Lante Wright, Kartik Gopalan
ICAC
2008
IEEE
14 years 3 months ago
Enabling Autonomic Meta-Scheduling in Grid Environments
Grid computing supports workload execution on computing resources that are shared across a set of collaborative organizations. At the core of workload management for Grid computin...
Yanbin Liu, Seyed Masoud Sadjadi, Liana Fong, Ivan...
ICPPW
2008
IEEE
14 years 3 months ago
Non-Contiguous I/O Support for Object-Based Storage
The access patterns performed by disk-intensive applications vary widely, from simple contiguous reads or writes through an entire file to completely unpredictable random access....
Dennis Dalessandro, Ananth Devulapalli, Pete Wycko...
NDSS
2008
IEEE
14 years 3 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
« Prev « First page 1849 / 1904 Last » Next »