Sciweavers

425 search results - page 43 / 85
» Virtual private caches
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 7 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
12 years 3 months ago
Transparent dynamic instrumentation
Process virtualization provides a virtual execution environment within which an unmodified application can be monitored and controlled while it executes. The provided layer of co...
Derek Bruening, Qin Zhao, Saman P. Amarasinghe
ASPLOS
1992
ACM
13 years 11 months ago
Application-Controlled Physical Memory using External Page-Cache Management
Next generation computer systems will have gigabytes of physical memory and processors in the 200 MIPS range or higher. While this trend suggests that memory management for most p...
Kieran Harty, David R. Cheriton
ISN
1995
Springer
13 years 11 months ago
VPN on DCE: From Reference Configuration to Implementation
–This paper presents the results of the implementation of a Virtual Private Network telecommunications service prototype and associated management services on a distributed platf...
Jean-Paul Gaspoz, Constant Gbaguidi, Jens Meink&ou...
VEE
2006
ACM
178views Virtualization» more  VEE 2006»
14 years 1 months ago
Impact of virtual execution environments on processor energy consumption and hardware adaptation
During recent years, microprocessor energy consumption has been surging and efforts to reduce power and energy have received a lot of attention. At the same time, virtual executio...
Shiwen Hu, Lizy Kurian John