Sciweavers

839 search results - page 104 / 168
» Self-recovery in server programs
Sort
View
ASPLOS
1998
ACM
14 years 2 months ago
Performance of Database Workloads on Shared-Memory Systems with Out-of-Order Processors
Database applications such as online transaction processing (OLTP) and decision support systems (DSS) constitute the largest and fastest-growing segment of the market for multipro...
Parthasarathy Ranganathan, Kourosh Gharachorloo, S...
IRREGULAR
1998
Springer
14 years 2 months ago
The Distributed Object-Oriented Threads System DOTS
Abstract. We describe the design and implementation of the Distributed ObjectOriented Threads System (DOTS). This system is a complete redesign of the Distributed Threads System (D...
Wolfgang Blochinger, Wolfgang Küchlin, Andrea...
AOSD
2007
ACM
14 years 2 months ago
Efficiently mining crosscutting concerns through random walks
Inspired by our past manual aspect mining experiences, this paper describes a random walk model to approximate how crosscutting concerns can be discovered in the absence of domain...
Charles Zhang, Hans-Arno Jacobsen
ASAP
2007
IEEE
133views Hardware» more  ASAP 2007»
14 years 2 months ago
An Efficient Hardware Support for Control Data Validation
Software-based, fine-grain control flow integrity (CFI) validation technique has been proposed to enforce control flow integrity of program execution. By validating every indirect...
Yong-Joon Park, Zhao Zhang, Gyungho Lee
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
14 years 2 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...