Sciweavers

56 search results - page 4 / 12
» A framework for malicious workload generation
Sort
View
TOCS
2012
11 years 10 months ago
A File Is Not a File: Understanding the I/O Behavior of Apple Desktop Applications
We analyze the I/O behavior of iBench, a new collection of productivity and multimedia application workloads. Our analysis reveals a number of differences between iBench and typic...
Tyler Harter, Chris Dragga, Michael Vaughn, Andrea...
PVLDB
2008
90views more  PVLDB 2008»
13 years 7 months ago
Generating XML structure using examples and constraints
This paper presents a framework for automatically generating structural XML documents. The user provides a target DTD and an example of an XML document, called a Generate-XML-ByEx...
Sara Cohen
ACMSE
2004
ACM
14 years 1 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
ESCIENCE
2007
IEEE
14 years 2 months ago
Aneka: Next-Generation Enterprise Grid Platform for e-Science and e-Business Applications
In this paper, we present the design of Aneka, a .NET based service-oriented platform for desktop grid computing that provides: (i) a configurable service container hosting plugga...
Xingchen Chu, Krishna Nadiminti, Chao Jin, Srikuma...
DEBS
2008
ACM
13 years 9 months ago
A framework for performance evaluation of complex event processing systems
Several new Complex Event Processing (CEP) engines have been recently released, many of which are intended to be used in performance sensitive scenarios - like fraud detection, tr...
Marcelo R. N. Mendes, Pedro Bizarro, Paulo Marques