Sciweavers

331 search results - page 13 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
USENIX
2008
13 years 9 months ago
Protection Strategies for Direct Access to Virtualized I/O Devices
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory ma...
Paul Willmann, Scott Rixner, Alan L. Cox
DATE
2009
IEEE
135views Hardware» more  DATE 2009»
14 years 2 months ago
System-level hardware-based protection of memories against soft-errors
We present a hardware-based approach to improve the resilience of a computer system against the errors occurred in the main memory with the help of error detecting and correcting ...
Valentin Gherman, Samuel Evain, Mickael Cartron, N...
JSS
2006
99views more  JSS 2006»
13 years 7 months ago
Software architecture-based regression testing
When architecting dependable systems, in addition to improving system dependability by means of construction (fault-tolerant and redundant mechanisms, for instance), it is also im...
Henry Muccini, Marcio S. Dias, Debra J. Richardson
CSSE
2002
IEEE
13 years 7 months ago
A fault tolerant access to legacy database systems using CORBA technology
This work presents a software-implemented fault tolerance approach for building a reliable database application in a CORBA environment. Database applications have functional requi...
Domenico Cotroneo, Nicola Mazzocca, Luigi Romano, ...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 4 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...