Sciweavers

1040 search results - page 72 / 208
» Resource Usage Verification
Sort
View
125
Voted
IPPS
2006
IEEE
15 years 8 months ago
Interceptor: middleware-level application segregation and scheduling for P2P systems
Very large size Peer-to-Peer systems are often required to implement efficient and scalable services, but usually they can be built only by assembling resources contributed by ma...
Cosimo Anglano
105
Voted
DATE
2010
IEEE
171views Hardware» more  DATE 2010»
15 years 7 months ago
Automated bottleneck-driven design-space exploration of media processing systems
Abstract—Media processing systems often have limited resources and strict performance requirements. An implementation must meet those design constraints while minimizing resource...
Yang Yang, Marc Geilen, Twan Basten, Sander Stuijk...
144
Voted
SIGOPSE
1994
ACM
15 years 6 months ago
SPIN - An Extensible Microkernel for Application-specific Operating System Services
Application domains, such as multimedia, databases, and parallel computing, require operating system services with high performance and high functionality. Existing operating syst...
Brian N. Bershad, Craig Chambers, Susan J. Eggers,...
105
Voted
CCS
2010
ACM
15 years 6 months ago
Apex: extending Android permission model and enforcement with user-defined runtime constraints
Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giv...
Mohammad Nauman, Sohail Khan, Xinwen Zhang
106
Voted
DCC
2003
IEEE
16 years 2 months ago
PPM Model Cleaning
The Prediction by Partial Matching (PPM) algorithm uses a cumulative frequency count of input symbols in different contexts to estimate their probability distribution. Excellent c...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak