Sciweavers

185 search results - page 27 / 37
» Software monitoring with bounded overhead
Sort
View
CCGRID
2008
IEEE
14 years 3 months ago
Advanced RDMA-Based Admission Control for Modern Data-Centers
—Current data-centers employ admission control mechanism to maintain low response time and high throughput under overloaded scenarios. Existing mechanisms use internal (on the ov...
Ping Lai, Sundeep Narravula, Karthikeyan Vaidyanat...
HPCA
2005
IEEE
14 years 9 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ICDE
2006
IEEE
204views Database» more  ICDE 2006»
14 years 2 months ago
AutoGlobe: An Automatic Administration Concept for Service-Oriented Database Applications
Future database application systems will be designed as Service Oriented Architectures (SOAs) like SAP’s NetWeaver instead of monolithic software systems such as SAP’s R/3. Th...
Stefan Seltzsam, Daniel Gmach, Stefan Krompass, Al...
IPPS
2006
IEEE
14 years 2 months ago
On-the-fly kernel updates for high-performance computing clusters
High-performance computing clusters running longlived tasks currently cannot have kernel software updates applied to them without causing system downtime. These clusters miss oppo...
Kristis Makris, Kyung Dong Ryu
ACSAC
2005
IEEE
14 years 2 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis