Sciweavers

155 search results - page 20 / 31
» This Side Up!
Sort
View
PLDI
2000
ACM
13 years 12 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
CCS
2000
ACM
13 years 12 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
ICRA
1998
IEEE
77views Robotics» more  ICRA 1998»
13 years 11 months ago
The Roles of Shape and Motion in Dynamic Manipulation: the Butterfly Example
We are studying a juggler's skill called the "butterfly." Startingwith a ball resting on the palm of his/her open hand, a skilled juggler can accelerate and shape h...
Kevin M. Lynch, Naoji Shiroma, Hirohiko Arai, Kazu...
MICRO
1998
IEEE
75views Hardware» more  MICRO 1998»
13 years 11 months ago
Improving Prediction for Procedure Returns with Return-address-stack Repair Mechanisms
This paper evaluates several mechanisms for repairing the return-address stack after branch mispredictions. The return-address stack is a small but important structure for achievi...
Kevin Skadron, Pritpal S. Ahuja, Margaret Martonos...
CLUSTER
2008
IEEE
13 years 9 months ago
Improving message passing over Ethernet with I/OAT copy offload in Open-MX
Abstract--Open-MX is a new message passing layer implemented on top of the generic Ethernet stack of the Linux kernel. Open-MX works on all Ethernet hardware, but it suffers from e...
Brice Goglin