Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to atta...
Qin Zhao, Rodric M. Rabbah, Saman P. Amarasinghe, ...
Efficient and competitive provision of service compositions depends both on the composition structure, and on planning and management of computational resources necessary for prov...
Dragan Ivanovic, Martin Treiber, Manuel Carro, Sch...
Shadows are well known as a programming language feature in the application area of MUDs (a certain type of multi-player online game). We argue that agile methodologies can be enh...
This paper describes \Object Group", an object behavioral pattern for group communication and fault-tolerance in distributed systems. The Object Group pattern supports the im...
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...