The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Remote server vulnerability exploit is one of the most troublesome threat to the Internet security. An effective defense against the remote vulnerability exploit is code randomization, which randomizes the program code address to disrupt the malicious payload execution. Unfortunately, code randomization is particularly susceptible to address exposure vulnerabilities; the leak of a single code or data...
Source code compiling is a non-trivial task that requires many computing resources. As a software project grows, its build time increases and debugging on a single computer becomes more and more time consuming task. An obvious solution would be a dedicated cluster acting as a build farm, where developers can send their requests. But in most cases, this solution has a very low utilization of available...
According to the problem that the ECC cannot correct the multibit error in ECC memory, this paper proposes a memory error processing method on software level. On the foundation of revising the Linux kernel code, the method can discover this area of influence area of memory error according to seek the process information mapping to the mistaken address. This way can avoid wastage to the user due to...
Network attack and defense experiments have always been the important practices in courses of network security. As the Internet is not a target of network attack and defense in experiments, a virtual network environment for attack and defense is needed. In this paper, we propose a network attack and defense experimental platform based on the virtual honey net. Network attacker is formed by a number...
Along with the more and more complex computer system, computer technology becomes more and more complex. The mistakes made by operation system, programming personnel and system analysis personnel or lack of experience can cause potential safety hazard. Computer virus, network attack, junk mail, system vulnerability, stealing information from network, false and harmful information, criminalities with...
This paper introduces the User-level Remote Swap Library, URSL, which enables memory-homogeneous Grid execution. This is obtained by letting the Grid infrastructure supply a remote memory bank to the connected resources. Insufficient memory at the contribution computer resource in a Grid is a major limitation when users seek to get high throughput in a Grid infrastructure, simply because a number...
We present GamePod, a portable system that enables mobile users to use the same persistent, gaming environment on any available computer. No matter what computer is being used, GamePod provides a consistent gaming environment, maintaining all of a user's games, including active game state. This is achieved by leveraging rapid improvements in capacity, cost, and size of portable storage devices. GamePod...
This paper is part of a larger project on MOSIX cluster computing. This paper also is a continuation of the previously published paper regarding MOSIX potential performance and threat (M. Hakim, J. Jais, 2008). The main focuses are on MOSIX implementation, survey and benchmark on MOSIX performance. In this paper, the information is presented in a broad to narrow approach, which is from an overview...
Many important problems that can be solved with the use of computers require significant amount of various resources. A multicomputer could meet this requirement.However, such a system needs software and hardware support to work efficiently. Scalable distributed data structure(SDDS) is an application for a multicomputer that allows for efficient management of data. In the paper it is shown that SDDS...
Software-based usage controls typically are vulnerable to attacks. Trusted platform modules (TPMs) can enable much more robust controls. However, as conventionally understood, TPM-secured systems may not support software updates or asynchronous communication. We contribute techniques that overcome these limitations, enabling updates, secure transmission of usage-controlled files via email or removable...
Active Storage provides an opportunity for reducing the amount of data movement between storage and compute nodes of a parallel filesystem such as Lustre, and PVFS. It allows certain types of data processing operations to be performed directly on the storage nodes of modern parallel filesystems, near the data they manage. This is possible by exploiting the underutilized processor and memory resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.