Sciweavers

782 search results - page 138 / 157
» Performance Engineering Case Study: Heap Construction
Sort
View
ISCC
2005
IEEE
14 years 1 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
CCS
2005
ACM
14 years 1 months ago
Misbehaving TCP receivers can cause internet-wide congestion collapse
An optimistic acknowledgment (opt-ack) is an acknowledgment sent by a misbehaving client for a data segment that it has not received. Whereas previous work has focused on opt-ack ...
Rob Sherwood, Bobby Bhattacharjee, Ryan Braud
POLICY
2004
Springer
14 years 27 days ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
PASTE
2010
ACM
14 years 18 days ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
PADL
1999
Springer
13 years 11 months ago
CHAT: The Copy-Hybrid Approach to Tabling
The copying approach to tabling (CAT) is an alternative to SLG-WAM and based on incrementally copying the areas that the SLG-WAM freezes to preserve execution states of suspended ...
Bart Demoen, Konstantinos F. Sagonas