Sciweavers

233 search results - page 37 / 47
» Composing and combining policies under the policy machine
Sort
View
ISCAPDCS
2008
13 years 9 months ago
LinSched: The Linux Scheduler Simulator
The Linux kernel 2.6.23 scheduler includes substantial changes that may entice researchers with no prior interest in Linux to attempt to understand or modify its behavior. Often, ...
John M. Calandrino, Dan P. Baumberger, Tong Li, Je...
OSDI
2000
ACM
13 years 8 months ago
Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently
Out-of-core applications consume physical resources at a rapid rate, causing interactive applications sharing the same machine to exhibit poor response times. This behavior is the...
Angela Demke Brown, Todd C. Mowry
KDD
2010
ACM
250views Data Mining» more  KDD 2010»
13 years 9 months ago
On community outliers and their efficient detection in information networks
Linked or networked data are ubiquitous in many applications. Examples include web data or hypertext documents connected via hyperlinks, social networks or user profiles connected...
Jing Gao, Feng Liang, Wei Fan, Chi Wang, Yizhou Su...
ATAL
2010
Springer
13 years 8 months ago
Linear options
Learning, planning, and representing knowledge in large state t multiple levels of temporal abstraction are key, long-standing challenges for building flexible autonomous agents. ...
Jonathan Sorg, Satinder P. Singh
ICSE
2008
IEEE-ACM
14 years 8 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su