Sciweavers

1316 search results - page 50 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
PPOPP
2009
ACM
14 years 9 months ago
Mapping parallelism to multi-cores: a machine learning based approach
The efficient mapping of program parallelism to multi-core processors is highly dependent on the underlying architecture. This paper proposes a portable and automatic compiler-bas...
Zheng Wang, Michael F. P. O'Boyle
ETRICS
2006
14 years 28 days ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
ICCD
2008
IEEE
117views Hardware» more  ICCD 2008»
14 years 6 months ago
RMA: A Read Miss-Based Spin-Down Algorithm using an NV cache
—It is an important issue to reduce the power consumption of a hard disk that takes a large amount of computer system’s power. As a new trend, an NV cache is used to make a dis...
Hyotaek Shim, Jaegeuk Kim, Dawoon Jung, Jin-Soo Ki...
ISORC
2007
IEEE
14 years 3 months ago
QUICKER: A Model-Driven QoS Mapping Tool for QoS-Enabled Component Middleware
This paper provides three contributions to the study of quality of service (QoS) configuration in component-based DRE systems. First, we describe the challenges associated with m...
Amogh Kavimandan, Krishnakumar Balasubramanian, Ni...
IAT
2007
IEEE
14 years 3 months ago
Design and Evaluation of a Multiagent Autonomic Information System
The goal of an autonomic system is to self-manage itself and adjust its actions in the face of environmental changes. In this paper, we adopt a multiagent approach to developing a...
Walamitien H. Oyenan, Scott A. DeLoach