Sciweavers

601 search results - page 119 / 121
» Lattice-based memory allocation
Sort
View
USS
2004
13 years 9 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
FAST
2010
13 years 8 months ago
DFS: A File System for Virtualized Flash Storage
This paper presents the design, implementation and evaluation of Direct File System (DFS) for virtualized flash storage. of using traditional layers of abstraction, our layers of ...
William K. Josephson, Lars Ailo Bongo, David Flynn...
ISLPED
2010
ACM
351views Hardware» more  ISLPED 2010»
13 years 7 months ago
Hybrid electrical energy storage systems
Electrical energy is a high quality form of energy that can be easily converted to other forms of energy with high efficiency and, even more importantly, it can be used to control...
Massoud Pedram, Naehyuck Chang, Younghyun Kim, Yan...
CCGRID
2010
IEEE
13 years 7 months ago
FaReS: Fair Resource Scheduling for VMM-Bypass InfiniBand Devices
In order to address the high performance I/O needs of HPC and enterprise applications, modern interconnection fabrics, such as InfiniBand and more recently, 10GigE, rely on network...
Adit Ranadive, Ada Gavrilovska, Karsten Schwan
MANSCI
2007
102views more  MANSCI 2007»
13 years 7 months ago
Implications of Renegotiation for Optimal Contract Flexibility and Investment
After entering into supply contracts, firms often later renegotiate the terms of those contracts. For example, firms that obtain market demand information after signing supply c...
Erica L. Plambeck, Terry A. Taylor