All Stories

  1. Bringing Memory Safety Close to the Wire
  2. Mind the cost of telemetry data analysis
  3. Network programming made easy and portable with Nethuns
  4. Data Stream Processing for Packet-Level Analytics
  5. BPFHV: Adaptive Network Paravirtualization for Continuous Cloud Provider Evolution
  6. Cache‐aware design of general‐purpose Single‐Producer–Single‐Consumer queues
  7. PSPAT: Software packet scheduling at hardware speed
  8. A Study of I/O Performance of Virtual Machines
  9. HyperNF
  10. A Survey of Fast Packet I/O Technologies for Network Function Virtualization
  11. Flexible virtual machine networking using netmap passthrough
  12. Very high speed link emulation with TLEM
  13. A Study of Speed Mismatches Between Communicating Virtual Machines
  14. k-Bisimulation: A Bisimulation for Measuring the Dissimilarity Between Processes
  15. mSwitch
  16. Virtual device passthrough for high speed VM networking
  17. Heuristic search for equivalence checking
  18. GreASE
  19. Speeding up packet I/O in virtual machines
  20. Efficient Genotype Elimination via Adaptive Allele Consolidation
  21. An Abstract Interpretation framework for genotype elimination algorithms
  22. VALE, a switched ethernet for virtual machines
  23. Celer: an Efficient Program for Genotype Elimination
  24. Using abstract interpretation to add type checking for interfaces in Java bytecode verification
  25. Partial model checking via abstract interpretation
  26. Decomposing bytecode verification by abstract interpretation
  27. Using postdomination to reduce space requirements of data flow analysis
  28. Using Control Dependencies for Space-Aware Bytecode Verification
  29. A Space-Aware Bytecode Verifier for Java Cards
  30. Caching and prefetching algorithms for programs with looping reference patterns
  31. Design Framework for a Distributed, Single-Address-Space System
  32. Checking secure information flow in Java bytecode by code transformation and standard bytecode verification
  33. Checking security properties by model checking
  34. An abstract semantics tool for secure information flow of stack-based assembly programs
  35. Persistent Object Systems: Design, Implementation, and Use
  36. Using standard verifier to check secure information flow in Java bytecode