Building automation systems: Concepts and technology review

P Domingues, P Carreira, R Vieira… - Computer Standards & …, 2016 - Elsevier
Despite the popularity of the subject, one surprising aspect of building automation (BA) is the
scarcity of authoritative literature references regarding the topic. This situation hampers …

Persistent memory: A survey of programming support and implementations

A Baldassin, J Barreto, D Castro… - ACM Computing Surveys …, 2021 - dl.acm.org
The recent rise of byte-addressable non-volatile memory technologies is blurring the
dichotomy between memory and storage. In particular, they allow programmers to have …

Rambleed: Reading bits in memory without accessing them

A Kwong, D Genkin, D Gruss… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
The Rowhammer bug is a reliability issue in DRAM cells that can enable an unprivileged
adversary to flip the values of bits in neighboring rows on the memory module. Previous …

Oblivm: A programming framework for secure computation

C Liu, XS Wang, K Nayak, Y Huang… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
We design and develop ObliVM, a programming framework for secure computation. ObliVM
offers a domain specific language designed for compilation of programs into efficient …

RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization

V Seshadri, Y Kim, C Fallin, D Lee… - Proceedings of the 46th …, 2013 - dl.acm.org
Several system-level operations trigger bulk data copy or initialization. Even though these
bulk data operations do not require any computation, current systems transfer a large …

[HTML][HTML] Kronodroid: time-based hybrid-featured dataset for effective android malware detection and characterization

A Guerra-Manzanares, H Bahsi, S Nõmm - Computers & Security, 2021 - Elsevier
Android malware evolution has been neglected by the available data sets, thus providing a
static snapshot of a non-stationary phenomenon. The impact of the time variable has not had …

Preventing page faults from telling your secrets

S Shinde, ZL Chua, V Narayanan… - … of the 11th ACM on Asia …, 2016 - dl.acm.org
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …

Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel

G Hertel, S Niedner, S Herrmann - Research policy, 2003 - Elsevier
The motives of 141 contributors to a large Open Source Software (OSS) project (the Linux
kernel) was explored with an Internet-based questionnaire study. Measured factors were …

Energy efficient allocation of virtual machines in cloud data centers

A Beloglazov, R Buyya - … on Cluster, Cloud and Grid Computing, 2010 - ieeexplore.ieee.org
Rapid growth of the demand for computational power has led to the creation of large-scale
data centers. They consume enormous amounts of electrical power resulting in high …

[图书][B] Computer systems: a programmer's perspective

RE Bryant, DR O'Hallaron - 2011 - thuvienso.hoasen.edu.vn
Computer Systems: A Programmer's Perspective Page 1 Computer Systems A Programmer’s
Perspective Randal E. Bryant Carnegie Mellon University David R. O’Hallaron Carnegie Mellon …