Sciweavers

2736 search results - page 504 / 548
» Implementable allocation rules
Sort
View
DIMVA
2010
13 years 11 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
MASCOTS
2010
13 years 11 months ago
EntomoModel: Understanding and Avoiding Performance Anomaly Manifestations
Subtle implementation errors or mis-configurations in complex Internet services may lead to performance degradations without causing failures. These undiscovered performance anomal...
Christopher Stewart, Kai Shen, Arun Iyengar, Jian ...
BDA
2006
13 years 11 months ago
Type-Based XML Projection
XML data projection (or pruning) is one of the main optimization techniques recently adopted in the context of main-memory XML query-engines. The underlying idea is quite simple: ...
Véronique Benzaken, Giuseppe Castagna, Dari...
CIC
2006
101views Communications» more  CIC 2006»
13 years 11 months ago
Non Blocking OVSF Codes Influence The Performance Of WCDMA System
In this paper the performance of OVSF and NOVSF codes in WCDMA are evaluated by calculating their blocking probability and plotting graphs between blocking probability and new call...
Shailendra Mishra, Nipur
PDCN
2004
13 years 11 months ago
Speculative prefetching of optional locks in distributed systems
We present a family of methods for speeding up distributed locks by exploiting the uneven distribution of both temporal and spatial locality of access behaviour of many applicatio...
Thomas Schöbel-Theuer