Sciweavers

983 search results - page 46 / 197
» A Better Update Policy
Sort
View
118
Voted
WCET
2010
15 years 1 months ago
Toward Precise PLRU Cache Analysis
Schedulability analysis for hard real-time systems requires bounds on the execution times of its tasks. To obtain useful bounds in the presence of caches, cache analysis is mandat...
Daniel Grund, Jan Reineke
107
Voted
APSEC
2007
IEEE
15 years 10 months ago
Coordination-Policy Based Composed System Behavior Derivation
The coordination-policy that components interactions satisfied often determines the properties of nowadays component-based information systems, e.g. Safety, Liveness and Fairness ...
Yiming Lau, Wenyun Zhao, Xin Peng, Zhixiong Jiang,...
139
Voted
CCS
2007
ACM
15 years 9 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
130
Voted
IJHPCA
2006
109views more  IJHPCA 2006»
15 years 3 months ago
A Resource Leasing Policy for on-Demand Computing
Leasing computational resources for on-demand computing is now a viable option for providers of network services. Temporary spikes or lulls in demand for a service can be accommod...
Darin England, Jon B. Weissman
122
Voted
ACSAC
2009
IEEE
15 years 7 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...