Sciweavers

1469 search results - page 170 / 294
» Map operations and k-orbit maps
Sort
View
MICRO
2008
IEEE
111views Hardware» more  MICRO 2008»
14 years 5 months ago
Reducing the harmful effects of last-level cache polluters with an OS-level, software-only pollute buffer
It is well recognized that LRU cache-line replacement can be ineffective for applications with large working sets or non-localized memory access patterns. Specifically, in lastle...
Livio Soares, David K. Tam, Michael Stumm
DSN
2007
IEEE
14 years 5 months ago
Enhancing DNS Resilience against Denial of Service Attacks
The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) atta...
Vasileios Pappas, Daniel Massey, Lixia Zhang
INFOCOM
2007
IEEE
14 years 5 months ago
A Proxy View of Quality of Domain Name Service
— The Domain Name System (DNS) provides a critical service for the Internet – mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard ...
Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-...
ER
2007
Springer
193views Database» more  ER 2007»
14 years 4 months ago
Applying Model Transformation By-Example on Business Process Modeling Languages
Model transformations are playing a vital role in the field of model engineering. However, for non-trivial transformation issues most approaches require imperative definitions, w...
Michael Strommer, Marion Murzek, Manuel Wimmer
LFCS
2007
Springer
14 years 4 months ago
Verifying Balanced Trees
Abstract. Balanced search trees provide guaranteed worst-case time performance and hence they form a very important class of data structures. However, the self-balancing ability co...
Zohar Manna, Henny B. Sipma, Ting Zhang