Sciweavers

2357 search results - page 467 / 472
» Computing Refactorings of Behavior Models
Sort
View
ISLPED
2003
ACM
115views Hardware» more  ISLPED 2003»
14 years 16 days ago
Reducing energy and delay using efficient victim caches
In this paper, we investigate methods for improving the hit rates in the first level of memory hierarchy. Particularly, we propose victim cache structures to reduce the number of ...
Gokhan Memik, Glenn Reinman, William H. Mangione-S...
NSPW
2003
ACM
14 years 16 days ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
PLDI
2003
ACM
14 years 16 days ago
Bug isolation via remote program sampling
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program’s user community. Several example applications illustrat...
Ben Liblit, Alexander Aiken, Alice X. Zheng, Micha...
CAISE
2003
Springer
14 years 15 days ago
Ontological Basis for Agent ADL
Abstract. Multi-Agent Systems (MAS) architectures are gaining popularity over traditional ones for building open, distributed or evolving software. To formally define system archit...
Stéphane Faulkner, Manuel Kolp
SIGECOM
2010
ACM
156views ECommerce» more  SIGECOM 2010»
14 years 2 days ago
Robust mechanisms for risk-averse sellers
The existing literature on optimal auctions focuses on optimizing the expected revenue of the seller, and is appropriate for risk-neutral sellers. In this paper, we identify good ...
Mukund Sundararajan, Qiqi Yan