Sciweavers

2746 search results - page 175 / 550
» Application performance on the Direct Access File System
Sort
View
CGO
2008
IEEE
14 years 3 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss
PERCOM
2011
ACM
13 years 1 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
JOT
2008
100views more  JOT 2008»
13 years 9 months ago
Panda: a Pattern-based Programming System for Automatic Code Generation
This article provides an overview of a pattern-based programming system, named Panda, for automatic generation of high-level programming language code. Many code generation system...
Daniele Mazzeranghi
TVCG
2012
167views Hardware» more  TVCG 2012»
11 years 11 months ago
Wellformedness Properties in Euler Diagrams: Which Should Be Used?
— Euler diagrams are often used to visualize intersecting data sets in applications such as criminology; genetics, medicine and computer file systems. One interesting aspect of t...
Peter Rodgers, Leishi Zhang, Helen C. Purchase
STORAGESS
2005
ACM
14 years 2 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...