Sciweavers

956 search results - page 159 / 192
» Multiple Views on System Traces
Sort
View
SIGMOD
2011
ACM
158views Database» more  SIGMOD 2011»
12 years 11 months ago
Workload-aware database monitoring and consolidation
In most enterprises, databases are deployed on dedicated database servers. Often, these servers are underutilized much of the time. For example, in traces from almost 200 producti...
Carlo Curino, Evan P. C. Jones, Samuel Madden, Har...
INFOCOM
2012
IEEE
11 years 11 months ago
FemtoCaching: Wireless video content delivery through distributed caching helpers
Abstract—We suggest a novel approach to handle the ongoing explosive increase in the demand for video content in wireless/mobile devices. We envision femtocell-like base stations...
Negin Golrezaei, Karthikeyan Shanmugam, Alexandros...
PLDI
2005
ACM
14 years 2 months ago
Checking type safety of foreign function calls
We present a multi-lingual type inference system for checking type safety across a foreign function interface. The goal of our system is to prevent foreign function calls from int...
Michael Furr, Jeffrey S. Foster
JKM
2007
213views more  JKM 2007»
13 years 8 months ago
A systems-based dynamic knowledge transfer capacity model
Purpose – The purpose of this paper is twofold: to understand how recent developments in systems thinking and social construction can influence understanding of knowledge trans...
Robert Parent, Mario Roy, Denis St-Jacques
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 3 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...