Now showing items 7-9 of 486

    • Execution Model Enforcement Via Program Shepherding 

      Kiriansky, Vladimir; Bruening, Derek; Amarasinghe, Saman (2003-05)
      Nearly all security attacks have one thing in common: they coerce the target program into performing actions that it was never intended to perform. In short, they violate the program's execution model. The execution model ...
    • Scalable Packet Classification Using Bit Vector Aggregating and Folding 

      Li, Ji; Liu, Haiyang; Sollins, Karen (2003-04)
      Packet classification is a central function for a number of network applications, such as routing and firewalls. Most existing algorithms for packet classification scale poorly in either time or space when the database ...
    • Stream Algorithms and Architecture 

      Henry, Hoffman; Strumpen, Volker; Agarwal, Anant (2003-03)
      Wire-exposed, programmable microarchitectures including Trips [11]], Smart Memories [8], and Raw [13] offer an opportunity to schedule instruction execution and data movement explicitly. This paper proposes stream algorithms, ...