Sciweavers

260 search results - page 33 / 52
» Quantifying the performance isolation properties of virtuali...
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 7 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
OSDI
2006
ACM
14 years 7 months ago
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
In current commodity systems, applications have no way of limiting their trust in the underlying operating system (OS), leaving them at the complete mercy of an attacker who gains...
Richard Ta-Min, Lionel Litty, David Lie
COOTS
1997
13 years 8 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
DAC
1998
ACM
13 years 11 months ago
A Geographically Distributed Framework for Embedded System Design and Validation
The di culty of embedded system co-design is increasing rapidly due to the increasing complexity of individual parts, the variety of parts available and pressure to use multiple p...
Ken Hines, Gaetano Borriello
IMSCCS
2007
IEEE
14 years 1 months ago
An Innovative Simulation Approach for Water Mediated Attraction Based on Grid Computing
In order to investigate the behavior of the solvation, particularly, to quantify the solvent effects on the properties of solutes on a molecular basis, several simulation approach...
Zhifeng Yun, Samuel J. Keasler, Maoyuan Xie, Zhou ...