Sciweavers

7694 search results - page 1338 / 1539
» An Implementation of an Applicative File System
Sort
View
CC
2007
Springer
109views System Software» more  CC 2007»
15 years 10 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
ECOOP
2007
Springer
15 years 10 months ago
Generational Real-Time Garbage Collection
Abstract. While real-time garbage collection is now available in production virtual machines, the lack of generational capability means applications with high allocation rates are ...
Daniel Frampton, David F. Bacon, Perry Cheng, Davi...
ECSQARU
2007
Springer
15 years 10 months ago
Syntactic Propositional Belief Bases Fusion with Removed Sets
Abstract. The problem of merging multiple sources information is central in several domains of computer science. In knowledge representation for artificial intelligence, several a...
Julien Hué, Odile Papini, Eric Würbel
ER
2007
Springer
123views Database» more  ER 2007»
15 years 10 months ago
Enriching OWL with Instance Recognition Semantics for Automated Semantic Annotation
Although OWL provides a solid basis for many semantic-web applications, it lacks sufficient declarative semantics for instance recognition. This omission prevents OWL from being a ...
Yihong Ding, David W. Embley, Stephen W. Liddle
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
« Prev « First page 1338 / 1539 Last » Next »