Sciweavers

1277 search results - page 128 / 256
» An Evaluation Approach for Dynamics-Aware Applications Using...
Sort
View
ISCA
1999
IEEE
94views Hardware» more  ISCA 1999»
14 years 2 months ago
A Performance Comparison of Contemporary DRAM Architectures
In response to the growing gap between memory access time and processor speed, DRAM manufacturers have created several new DRAM architectures. This paper presents a simulation-bas...
Vinodh Cuppu, Bruce L. Jacob, Brian Davis, Trevor ...
SEMWEB
2010
Springer
13 years 8 months ago
A Self-Policing Policy Language
Abstract. Formal policies allow the non-ambiguous definition of situations in which usage of certain entities are allowed, and enable the automatic evaluation whether a situation i...
Sebastian Speiser, Rudi Studer
CCS
2007
ACM
14 years 4 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
HPDC
2010
IEEE
13 years 11 months ago
Massive Semantic Web data compression with MapReduce
The Semantic Web consists of many billions of statements made of terms that are either URIs or literals. Since these terms usually consist of long sequences of characters, an effe...
Jacopo Urbani, Jason Maassen, Henri E. Bal
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
13 years 1 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...