Sciweavers

3335 search results - page 600 / 667
» A Unified Approach to Modeling and Programming
Sort
View
NSPW
2003
ACM
15 years 9 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
ISCA
1999
IEEE
110views Hardware» more  ISCA 1999»
15 years 8 months ago
Decoupling Local Variable Accesses in a Wide-Issue Superscalar Processor
Providing adequate data bandwidth is extremely important for a wide-issue superscalar processor to achieve its full performance potential. Adding a large number of ports to a data...
Sangyeun Cho, Pen-Chung Yew, Gyungho Lee
CP
2008
Springer
15 years 5 months ago
Search Strategies for Rectangle Packing
Rectangle (square) packing problems involve packing all squares with sizes 1 × 1 to n × n into the minimum area enclosing rectangle (respectively, square). Rectangle packing is a...
Helmut Simonis, Barry O'Sullivan
WS
2008
ACM
15 years 4 months ago
ActiveRDF: Embedding Semantic Web data into object-oriented languages
Semantic Web applications share a large portion of development effort with database-driven Web applications. Existing approaches for development of these database-driven applicati...
Eyal Oren, Benjamin Heitmann, Stefan Decker
SIGMOD
2011
ACM
158views Database» more  SIGMOD 2011»
14 years 7 months ago
Workload-aware database monitoring and consolidation
In most enterprises, databases are deployed on dedicated database servers. Often, these servers are underutilized much of the time. For example, in traces from almost 200 producti...
Carlo Curino, Evan P. C. Jones, Samuel Madden, Har...