Sciweavers

3686 search results - page 521 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
ICAC
2007
IEEE
14 years 3 months ago
Autonomous Return on Investment Analysis of Additional Processing Resources
As the use of virtualization and partitioning grows, it becomes possible to deploy a multi-tier web-based application with a variable amount of computing power. This introduces th...
Jonathan Wildstrom, Peter Stone, Emmett Witchel
CC
2001
Springer
121views System Software» more  CC 2001»
14 years 1 months ago
Constant-Time Root Scanning for Deterministic Garbage Collection
Root scanning is the task of identifying references to heap objects that are stored outside of the heap itself, in global and local variables and on the execution stack. Root scann...
Fridtjof Siebert
SIGUCCS
2003
ACM
14 years 2 months ago
It takes a village to build an image
Managing operating systems and campus-supported software can be a daunting challenge. Many colleges and universities handle these challenges by using disk imaging software to crea...
R. Mark Koan, Kelly Caye, Steven K. Brawn
CASES
2005
ACM
13 years 11 months ago
An Esterel processor with full preemption support and its worst case reaction time analysis
The concurrent synchronous language Esterel allows proto treat reactive systems in an abstract, concise manner. An Esterel program is typically first translated into other, non-s...
Xin Li, Jan Lukoschus, Marian Boldt, Michael Harde...
CACM
2005
126views more  CACM 2005»
13 years 9 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati