Sciweavers

307 search results - page 43 / 62
» On the Integrity of Lightweight Checkpoints
Sort
View
CHI
2004
ACM
16 years 4 months ago
Personal information management
The explosion of the amount of information available in digital form has made search a hot research topic for the Information Management Community. While most of the research on s...
Ofer Bergman, Richard P. Boardman, Jacek Gwizdka, ...
ICSE
2008
IEEE-ACM
16 years 4 months ago
CCVisu: automatic visual software decomposition
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given s...
Dirk Beyer
HIPEAC
2010
Springer
16 years 1 months ago
Combining Locality Analysis with Online Proactive Job Co-scheduling in Chip Multiprocessors
Abstract. The shared-cache contention on Chip Multiprocessors causes performance degradation to applications and hurts system fairness. Many previously proposed solutions schedule ...
Yunlian Jiang, Kai Tian, Xipeng Shen
PADS
2009
ACM
15 years 11 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
EDBT
2009
ACM
127views Database» more  EDBT 2009»
15 years 10 months ago
Approximate substring selectivity estimation
We study the problem of estimating selectivity of approximate substring queries. Its importance in databases is ever increasing as more and more data are input by users and are in...
Hongrae Lee, Raymond T. Ng, Kyuseok Shim