Sciweavers

1815 search results - page 164 / 363
» Making the Business Case for Software Performance Engineerin...
Sort
View
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
13 years 6 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
WWW
2002
ACM
16 years 4 months ago
A pragmatic application of the semantic web using SemTalk
The Semantic Web is a new layer of the Internet that enables semantic representation of the contents of existing web pages. Using common ontologies, human users sketch out the mos...
Christian Fillies, Gay Wood-Albrecht, Frauke Weich...
EUROSYS
2007
ACM
16 years 1 months ago
hFS: a hybrid file system prototype for improving small file and metadata performance
Two oft-cited file systems, the Fast File System (FFS) and the Log-Structured File System (LFS), adopt two sharply different update strategies—update-in-place and update-out-of-...
Zhihui Zhang, Kanad Ghose
ICSM
2009
IEEE
15 years 10 months ago
Maintenance and agile development: Challenges, opportunities and future directions
Software entropy is a phenomenon where repeated changes gradually degrade the structure of the system, making it hard to understand and maintain. This phenomenon imposes challenge...
Geir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar...
ICST
2009
IEEE
15 years 1 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz