Sciweavers

673 search results - page 34 / 135
» Request behavior variations
Sort
View
HPCA
2002
IEEE
14 years 9 months ago
Bandwidth Adaptive Snooping
This paper advocates that cache coherence protocols use a bandwidth adaptive approach to adjust to varied system configurations (e.g., number of processors) and workload behaviors...
Milo M. K. Martin, Daniel J. Sorin, Mark D. Hill, ...
ACSAC
2008
IEEE
14 years 3 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CLUSTER
2006
IEEE
14 years 2 months ago
I/O Scheduling Service for Multi-Application Clusters
Distributed applications, especially the ones being I/O intensive, often access the storage subsystem in a non-sequential way (stride requests). Since such behaviors lower the ove...
Adrien Lebre, Guillaume Huard, Yves Denneulin, Prz...
ACL
1998
13 years 10 months ago
Dialogue Management in Vector-Based Call Routing
This paper describes a domain independent, automatically trained call router which directs customer calls based on their response to an open-ended "How may I direct your call...
Jennifer Chu-Carroll, Bob Carpenter
TC
1998
13 years 8 months ago
Using System-Level Models to Evaluate I/O Subsystem Designs
—We describe a system-level simulation model and show that it enables accurate predictions of both I/O subsystem and overall system performance. In contrast, the conventional app...
Gregory R. Ganger, Yale N. Patt