Sciweavers

1949 search results - page 2 / 390
» Protective Interface Specifications
Sort
View
COMPSAC
2003
IEEE
14 years 23 days ago
Protecting Distributed Software Upgrades that Involve Message-Passing Interface Changes
We present in this paper an extension of the messagedriven confidence-driven framework that we developed for onboard guarded software upgrading. The purpose of this work is to pr...
Ann T. Tai, Kam S. Tso, William H. Sanders
HPCA
1996
IEEE
13 years 11 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...
ISCAS
2005
IEEE
165views Hardware» more  ISCAS 2005»
14 years 1 months ago
An area-efficient and protected network interface for processing-in-memory systems
Abstract- This paper describes the implementation of an areaefficient and protected user memory-mapped network interface, the pbuf (Parcel Buffer), for the Data IntensiVe Architect...
Sumit D. Mediratta, Craig S. Steele, Jeff Sondeen,...
ACSAC
2003
IEEE
14 years 23 days ago
Goalkeeper: Close-In Interface Protection
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Stephen D. Wolthusen
GRID
2005
Springer
14 years 1 months ago
Protecting grid data transfer services with active network interfaces
A key goal of grid computing is to provide seamless access to shared computational and data resources across organizational boundaries, in distributed virtual organizations. Grid ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...