Sciweavers

113 search results - page 17 / 23
» A Proposal for Dependent Optimization in Scalable Region-Bas...
Sort
View
FAST
2010
13 years 10 months ago
A Clean-Slate Look at Disk Scrubbing
A number of techniques have been proposed to reduce the risk of data loss in hard-drives, from redundant disks (e.g., RAID systems) to error coding within individual drives. Disk ...
Alina Oprea, Ari Juels
CGO
2010
IEEE
14 years 2 months ago
Automated just-in-time compiler tuning
Managed runtime systems, such as a Java virtual machine (JVM), are complex pieces of software with many interacting components. The Just-In-Time (JIT) compiler is at the core of t...
Kenneth Hoste, Andy Georges, Lieven Eeckhout
IPCCC
2005
IEEE
14 years 1 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
CC
2008
Springer
130views System Software» more  CC 2008»
13 years 9 months ago
IDE Dataflow Analysis in the Presence of Large Object-Oriented Libraries
Abstract. A key scalability challenge for interprocedural dataflow analysis comes from large libraries. Our work addresses this challenge for the general category of interprocedura...
Atanas Rountev, Mariana Sharp, Guoqing Xu
WAC
2005
Springer
118views Communications» more  WAC 2005»
14 years 1 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin