Sciweavers

819 search results - page 110 / 164
» A Technique for Combined Virtual Prototyping and Hardware De...
Sort
View
CCS
2007
ACM
14 years 2 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
DAC
2007
ACM
14 years 9 months ago
Global Critical Path: A Tool for System-Level Timing Analysis
An effective method for focusing optimization effort on the most important parts of a design is to examine those elements on the critical path. Traditionally, the critical path is...
Girish Venkataramani, Mihai Budiu, Tiberiu Chelcea...
SIGMOD
2011
ACM
158views Database» more  SIGMOD 2011»
12 years 10 months ago
Workload-aware database monitoring and consolidation
In most enterprises, databases are deployed on dedicated database servers. Often, these servers are underutilized much of the time. For example, in traces from almost 200 producti...
Carlo Curino, Evan P. C. Jones, Samuel Madden, Har...
WWW
2004
ACM
14 years 8 months ago
XVM: a bridge between xml data and its behavior
XML has become one of the core technologies for contemporary business applications, especially web-based applications. To facilitate processing of diverse XML data, we propose an ...
Quanzhong Li, Michelle Y. Kim, Edward So, Steve Wo...
ICPP
2008
IEEE
14 years 2 months ago
Bridging the Gap Between Parallel File Systems and Local File Systems: A Case Study with PVFS
Parallel I/O plays an increasingly important role in today’s data intensive computing applications. While much attention has been paid to parallel read performance, most of this...
Peng Gu, Jun Wang, Robert Ross