Sciweavers

1448 search results - page 27 / 290
» Deadlock Detection in Distributed Systems
Sort
View
HIPC
2004
Springer
14 years 1 months ago
Lock-Free Parallel Algorithms: An Experimental Study
Abstract. Lock-free shared data structures in the setting of distributed computing have received a fair amount of attention. Major motivations of lock-free data structures include ...
Guojing Cong, David A. Bader
ISCA
2007
IEEE
143views Hardware» more  ISCA 2007»
14 years 2 months ago
Performance pathologies in hardware transactional memory
Hardware Transactional Memory (HTM) systems reflect choices from three key design dimensions: conflict detection, version management, and conflict resolution. Previously propos...
Jayaram Bobba, Kevin E. Moore, Haris Volos, Luke Y...
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
13 years 12 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 1 months ago
Identifying Transformer Incipient Events for Maintaining Distribution System Reliability
This paper presents the time domain and timefrequency domain analysis results of incipient events in single-phase distribution transformers. This analysis will aid in the developm...
Karen L. Butler-Purry, Mustafa Bagriyanik
EUROSYS
2007
ACM
13 years 11 months ago
Discrete control for safe execution of IT automation workflows
As information technology (IT) administration becomes increasingly complex, workflow technologies are gaining popularity for IT automation. Writing correct workflow programs is no...
Yin Wang, Terence Kelly, Stéphane Lafortune