Sciweavers

1372 search results - page 263 / 275
» Implementing an ITIL-Based IT Service Management Measurement...
Sort
View
PLDI
2006
ACM
14 years 2 months ago
The Compressor: concurrent, incremental, and parallel compaction
The widely used Mark-and-Sweep garbage collector has a drawback in that it does not move objects during collection. As a result, large long-running realistic applications, such as...
Haim Kermany, Erez Petrank
SIGSOFT
2003
ACM
14 years 9 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
SIGUCCS
2000
ACM
14 years 25 days ago
Putting Help Where the User Is - A Desktop Computer Support Strategy
As the personal computer becomes a more integral part of the faculty member’s job, the increasing level of day-to-day computer support - often without increases in full-time sta...
Cheryl Stahler
TMC
2012
11 years 11 months ago
SenseLess: A Database-Driven White Spaces Network
The FCC ruling on Nov 4th, 2008 on white spaces has opened up the possibility of wireless network deployments over white spaces, i.e., vacant UHF TV channels. A key requirement fo...
Rohan Murty, Ranveer Chandra, Thomas Moscibroda, P...
ICAC
2006
IEEE
14 years 2 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul