Sciweavers

1079 search results - page 120 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
WMCSA
2008
IEEE
14 years 3 months ago
Low-bandwidth VM migration via opportunistic replay
Virtual machine (VM) migration has been proposed as a building block for mobile computing. An important challenge for VM migration is to optimize the transfer of large amounts of ...
Ajay Surie, H. Andrés Lagar-Cavilla, Eyal d...
COMPSAC
2008
IEEE
14 years 3 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
XIMEP
2004
ACM
108views Database» more  XIMEP 2004»
14 years 2 months ago
The Joy of SAX
Most current XQuery implementations require that all XML data reside in memory in one form or another before they start processing the data. This is unacceptable for large XML doc...
Leonidas Fegaras
ICCD
2003
IEEE
129views Hardware» more  ICCD 2003»
14 years 6 months ago
Reducing dTLB Energy Through Dynamic Resizing
Translation Look-aside Buffer (TLB), which is small Content Addressable Memory (CAM) structure used to translate virtual addresses to physical addresses, can consume significant ...
Victor Delaluz, Mahmut T. Kandemir, Anand Sivasubr...
GLOBECOM
2006
IEEE
14 years 3 months ago
Any Source Implicit Multicast (ASIMcast)
Abstract— This paper proposes the ASIMcast (Any-Source Implicit Multicast) protocol which builds a bidirectional tree for routing of multicast traffic. ASIMcast includes feature...
Laurent Nadeau, Tricha Anjali