Sciweavers

492 search results - page 26 / 99
» Exploring Recovery from Operating System Lockups
Sort
View
PRDC
1999
IEEE
14 years 4 days ago
Networked Windows NT System Field Failure Data Analysis
This paper presents a measurement-based dependability study of a Networked Windows NT system based on field data collected from NT System Logs from 503 servers running in a produc...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
RSP
2006
IEEE
120views Control Systems» more  RSP 2006»
14 years 1 months ago
A Case Study of Design Space Exploration for Embedded Multimedia Applications on SoCs
Embedded real-time multimedia applications usually imply data parallel processing. SIMD processors embedded in SOCs are cost-effective to exploit the underlying parallelism. Howev...
Isabelle Hurbain, Corinne Ancourt, François...
ICDT
2010
ACM
163views Database» more  ICDT 2010»
13 years 6 months ago
Composing Local-As-View Mappings
Schema mapping composition is a fundamental operation in schema management and data exchange. The mapping composition problem has been extensively studied for a number of mapping ...
Patricia Arocena, Ariel Fuxman, Renee Miller
ICDE
1997
IEEE
136views Database» more  ICDE 1997»
14 years 9 months ago
Delegation: Efficiently Rewriting History
Transaction delegation, as introduced in ACTA, allows a transaction to transfer responsibility for the operations that it has performed on an object to another transaction. Delega...
Cris Pedregal Martin, Krithi Ramamritham
CCS
2010
ACM
13 years 6 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot