Sciweavers

1299 search results - page 79 / 260
» On the Correctness of Operating System Kernels
Sort
View
HPCA
1996
IEEE
15 years 8 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...
SRDS
2010
IEEE
15 years 2 months ago
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection so...
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, J...
SENSYS
2009
ACM
15 years 11 months ago
TOSThreads: thread-safe and non-invasive preemption in TinyOS
Many threads packages have been proposed for programming wireless sensor platforms. However, many sensor network operating systems still choose to provide an eventdriven model, du...
Kevin Klues, Chieh-Jan Mike Liang, Jeongyeup Paek,...
APN
2010
Springer
15 years 9 months ago
Wendy: A Tool to Synthesize Partners for Services
Service-oriented computing proposes services as building blocks which can be composed to complex systems. To reason about the correctness of a service, its communication protocol n...
Niels Lohmann, Daniela Weinberg
ASPLOS
2004
ACM
15 years 9 months ago
HOIST: a system for automatically deriving static analyzers for embedded systems
Embedded software must meet conflicting requirements such as being highly reliable, running on resource-constrained platforms, and being developed rapidly. Static program analysi...
John Regehr, Alastair Reid