Sciweavers

2297 search results - page 407 / 460
» A fast APRIORI implementation
Sort
View
CMS
2006
15 years 5 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
USENIX
2003
15 years 5 months ago
Operating System I/O Speculation: How Two Invocations Are Faster Than One
We present an in-kernel disk prefetcher which uses speculative execution to determine what data an application is likely to require in the near future. By placing our design withi...
Keir Faser, Fay Chang
142
Voted
SOSP
1993
ACM
15 years 5 months ago
Improving IPC by Kernel Design
Inter-process communication (ipc) has to be fast and e ective, otherwise programmers will not use remote procedure calls(RPC),multithreadingand multitasking adequately. Thus ipc p...
Jochen Liedtke
CONEXT
2009
ACM
15 years 5 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
GECCO
2008
Springer
122views Optimization» more  GECCO 2008»
15 years 5 months ago
Evolving machine microprograms
The realization of a control unit can be done using a complex circuitry or microprogramming. The latter may be considered as an alternative method of implementation of machine ins...
Pedro A. Castillo Valdivieso, G. Fernández,...