X86

Results: 2025



#Item
61Computing / System software / Software / System administration / Internet Standards / Internet protocols / Network management / Syslog / X86-64 / Filesystem Hierarchy Standard

PDF Document

Add to Reading List

Source URL: hm.hgesser.de

Language: English - Date: 2009-03-04 06:20:29
62Computing / Software engineering / Computer programming / Software bugs / X86 architecture / Buffer overflow / Computer memory / X86-64 / Return-to-libc attack / X86 / Return-oriented programming / NX bit

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
63Computing / Computer architecture / Fault-tolerant computer systems / Software / Concurrent computing / Parallel computing / Application checkpointing / Computer cluster / Linux kernel / Checkpoint / Thread / X86-64

An Overview of Berkeley Lab Checkpoint/Restart (BLCR) for Linux Clusters Paul Hargrove with Jason Duell and Eric Roman http://ftg.lbl.gov/checkpoint

Add to Reading List

Source URL: crd.lbl.gov

Language: English - Date: 2012-09-05 12:41:12
64Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
65Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
66Computer hardware / Computing / Motherboard / Computer buses / Side-channel attacks / DMA attack / Direct memory access / PC Card / IEEE / X86-64 / Field-programmable gate array

Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine Physical attacks

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
67Computing / System software / Software / System administration / Internet Standards / Internet protocols / Network management / Syslog / X86-64 / Hybrid drive / Filesystem Hierarchy Standard

PDF Document

Add to Reading List

Source URL: hm.hgesser.de

Language: English - Date: 2009-03-04 06:20:24
68Software / System software / Computing / Hypervisor / Xen / Paravirtualization / Hyper-V / Hardware virtualization / QEMU / Kernel-based Virtual Machine / X86 virtualization / Virtual machine

ARM Virtualization: Performance and Architectural Implications

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2016-07-02 09:59:49
69Computing / Computer architecture / Computer engineering / Parallel computing / X86 architecture / Intel Corporation / Xeon Phi / Multi-core processor / Xeon / Hyper-threading / ODROID / Intel Core

PDF Document

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2014-06-11 17:22:53
70Computing / Cross-platform software / Computing platforms / Java platform / Java / X86-64 / MacOS / Linux / Microsoft Windows / Java version history / Comparison of agent-based modeling software

ASSIST  Installation  Guide   Step  1.  Unzip  file  (ASSIST3.zip)  you  downloaded  from   http://icewatch.gina.alaska.edu/assist  to  desired  location  on  your   com

Add to Reading List

Source URL: s3-us-west-2.amazonaws.com

Language: English - Date: 2016-08-01 18:22:08
UPDATE