Sciweavers

1131 search results - page 146 / 227
» Performance analysis of BSTs in system software
Sort
View
116
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
176
Voted
SIGMETRICS
2008
ACM
214views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
HMTT: a platform independent full-system memory trace monitoring system
Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements. Many appro...
Yungang Bao, Mingyu Chen, Yuan Ruan, Li Liu, Jianp...
CLEF
2005
Springer
15 years 9 months ago
CLEF 2005: Ad Hoc Track Overview
We describe the objectives and organization of the CLEF 2005 ad hoc track and discuss the main characteristics of the tasks offered to test monolingual, bilingual and multilingual ...
Giorgio Maria Di Nunzio, Nicola Ferro, Gareth J. F...
MICRO
2009
IEEE
168views Hardware» more  MICRO 2009»
15 years 10 months ago
Ordering decoupled metadata accesses in multiprocessors
Hardware support for dynamic analysis can minimize the performance overhead of useful applications such as security checks, debugging, and profiling. To eliminate implementation ...
Hari Kannan
CCS
2011
ACM
14 years 3 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...