Sciweavers

596 search results - page 95 / 120
» The Design and Implementation of a Kernel Monitoring System ...
Sort
View
USS
2010
13 years 5 months ago
The Case for Ubiquitous Transport-Level Encryption
Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpc...
Andrea Bittau, Michael Hamburg, Mark Handley, Davi...
CLUSTER
2001
IEEE
13 years 11 months ago
SOVIA: A User-level Sockets Layer Over Virtual Interface Architecture
The Virtual Interface Architecture (VIA) is an industry standard user-level communication architecture for system area networks. The VIA provides a protected, directlyaccessible i...
Jin-Soo Kim, Kangho Kim, Sung-In Jung
RTSS
2008
IEEE
14 years 1 months ago
A Holistic Approach to Decentralized Structural Damage Localization Using Wireless Sensor Networks
Wireless sensor networks (WSNs) have become an increasingly compelling platform for Structural Health Monitoring (SHM) applications, since they can be installed relatively inexpen...
Gregory Hackmann, Fei Sun, Nestor Castaneda, Cheny...
CCS
2007
ACM
14 years 1 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
USENIX
2003
13 years 8 months ago
Undo for Operators: Building an Undoable E-mail Store
System operators play a critical role in maintaining server dependability yet lack powerful tools to help them do so. To help address this unfulfilled need, we describe Operator U...
Aaron B. Brown, David A. Patterson