Sciweavers

845 search results - page 132 / 169
» Reliable operating modes for distributed embedded systems
Sort
View
142
Voted
TISSEC
2010
119views more  TISSEC 2010»
14 years 10 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
128
Voted
PLDI
2006
ACM
15 years 9 months ago
DieHard: probabilistic memory safety for unsafe languages
Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling pointers, and reads of uninitialized data. Such errors ...
Emery D. Berger, Benjamin G. Zorn
150
Voted
CCGRID
2010
IEEE
15 years 4 months ago
Energy Efficient Resource Management in Virtualized Cloud Data Centers
Rapid growth of the demand for computational power by scientific, business and web-applications has led to the creation of large-scale data centers consuming enormous amounts of el...
Anton Beloglazov, Rajkumar Buyya
121
Voted
IPPS
2005
IEEE
15 years 9 months ago
Dynamic Delay-Fault Injection for Reconfigurable Hardware
Modern internet and telephone switches consist of numerous VLSI-circuits operating at high frequencies to handle high bandwidths. It is beyond question that such systems must cont...
Bernhard Fechner
146
Voted
SOSP
2007
ACM
16 years 11 days ago
/*icomment: bugs or bad comments?*/
Commenting source code has long been a common practice in software development. Compared to source code, comments are more direct, descriptive and easy-to-understand. Comments and...
Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou