Sciweavers

1299 search results - page 51 / 260
» On the Correctness of Operating System Kernels
Sort
View
164
Voted
WOSP
2004
ACM
15 years 9 months ago
Collecting whole-system reference traces of multiprogrammed and multithreaded workloads
The simulated evaluation of memory management policies relies on reference traces—logs of memory operations performed by running processes. No existing approach to reference tra...
Scott F. Kaplan
CJ
2004
93views more  CJ 2004»
15 years 3 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
JAT
2006
69views more  JAT 2006»
15 years 4 months ago
Almost periodic Verblunsky coefficients and reproducing kernels on Riemann surfaces
We give an explicit parametrization of a set of almost periodic CMV matrices whose spectrum (is equal to the absolute continuous spectrum and) is a homogenous set E lying on the u...
Franz Peherstorfer, P. Yuditskii
KDD
2005
ACM
193views Data Mining» more  KDD 2005»
16 years 4 months ago
An approach to spacecraft anomaly detection problem using kernel feature space
Development of advanced anomaly detection and failure diagnosis technologies for spacecraft is a quite significant issue in the space industry, because the space environment is ha...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
ACSAC
2003
IEEE
15 years 9 months ago
Goalkeeper: Close-In Interface Protection
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Stephen D. Wolthusen