Sciweavers

5344 search results - page 100 / 1069
» Privacy-Preserving Set Operations
Sort
View
SIGCOMM
2009
ACM
15 years 9 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
ISCA
2007
IEEE
142views Hardware» more  ISCA 2007»
15 years 8 months ago
MetaTM//TxLinux: transactional memory for an operating system
This paper quantifies the effect of architectural design decisions on the performance of TxLinux. TxLinux is a Linux kernel modified to use transactions in place of locking prim...
Hany E. Ramadan, Christopher J. Rossbach, Donald E...
ISOLA
2004
Springer
15 years 7 months ago
Static Timing Analysis of Real-Time Operating System Code
Methods for Worst-Case Execution Time (WCET) analysis have been known for some time, and recently commercial tools have emerged. However, the technique has so far not been much use...
Daniel Sandell, Andreas Ermedahl, Jan Gustafsson, ...
SIGMETRICS
2003
ACM
129views Hardware» more  SIGMETRICS 2003»
15 years 7 months ago
Run-time modeling and estimation of operating system power consumption
The increasing constraints on power consumption in many computing systems point to the need for power modeling and estimation for all components of a system. The Operating System ...
Tao Li, Lizy Kurian John
174
Voted
VR
1999
IEEE
152views Virtual Reality» more  VR 1999»
15 years 6 months ago
An Operator Interface for a Robot-Mounted, 3D Camera System: Project Pioneer
The purpose of Project Pioneer is to develop an exploratory robot capable of creating a three-dimensional photo-realistic map of the inside of the damaged Chornobyl Nuclear Reacto...
Fitzgerald Steele Jr., Geb W. Thomas, Theodore Bla...