User-level Enforcement of Appropriate Background Process Execution
نویسندگان
چکیده
منابع مشابه
High-Level Speculative Execution Based on Predictive User Modeling
Slow response is a bane of human interfaces. Computers often react slowly to commands and queries—sometimes taking longer than measured human attention spans—wasting users’ time and causing frustration and distraction. We might hope the steady improvement in computer hardware would solve this problem, but software is simultaneously becoming larger and more complex. As designers of increasingly ...
متن کاملA user-Level process package for PVM
This paper describes an approach to supporting efcient processor virtualization and dynamic load balancing for message-based, parallel programs. Specifically, a user-level process package (UPVM) for SPMD-style PVM applications is presented. UPVM supports light-weight virtual processors that are transparently and independently migratable. It also implements a source-code compatible PVM interface...
متن کاملUser-level Process towards Exascale Systems
The process oversubscription, which binds multiple parallel processes to one CPU core, can hide the communication latency and reduce CPU idle time. However, the lightweight OS kernels for Exascale systems may no longer support OS task scheduling. Without OS task scheduling, only one parallel process per CPU core is allowed, and then the process oversubscription is impossible. Even if the OS tas...
متن کاملExecution monitoring enforcement under memory-limitation constraints
Recently, attention has been given to formally characterize security policies that are enforceable by different kinds of security mechanisms. A very important research problem is the characterization of security policies that are enforceable by execution monitors constrained by memory limitations. This paper contributes to give more precise answers to this research problem. To represent executi...
متن کاملExecution Model Enforcement Via Program Shepherding
Nearly all security attacks have one thing in common: they coerce the target program into performing actions that it was never intended to perform. In short, they violate the program’s execution model. The execution model encompasses the Application Binary Interface (ABI), higher-level specifications from the program’s source programming language, and components specific to the program — for ex...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IPSJ Online Transactions
سال: 2011
ISSN: 1882-6660
DOI: 10.2197/ipsjtrans.4.94