Sciweavers

146 search results - page 23 / 30
» Sequential Traitor Tracing
Sort
View
IWPC
2006
IEEE
14 years 3 months ago
Dynamic Analysis of Software Systems using Execution Pattern Mining
Software system analysis for extracting system functionality remains as a major problem in the reverse engineering literature and the early approaches mainly rely on static proper...
Hossein Safyallah, Kamran Sartipi
IAT
2005
IEEE
14 years 2 months ago
An Approximate Pareto Optimal Cooperative Negotiation Model for Multiple
Cooperative negotiation is proved to be an effective paradigm to solve complex dynamic multi-objective problems in which each objective is associated to an agent. When the multi-o...
Nicola Gatti, Francesco Amigoni
FAST
2010
13 years 11 months ago
Extending SSD Lifetimes with Disk-Based Write Caches
We present Griffin, a hybrid storage device that uses a hard disk drive (HDD) as a write cache for a Solid State Device (SSD). Griffin is motivated by two observations: First, HDD...
Gokul Soundararajan, Vijayan Prabhakaran, Mahesh B...
FAC
2006
92views more  FAC 2006»
13 years 9 months ago
Action Refinement Applied to Late Decisions
In modular approaches to specify concurrent systems a system is built up from components using various operators as e.g. the sequential, the parallel, or the choice (+) operator. U...
Harald Fecher, Mila E. Majster-Cederbaum
PVLDB
2010
164views more  PVLDB 2010»
13 years 7 months ago
FlashStore: High Throughput Persistent Key-Value Store
We present FlashStore, a high throughput persistent keyvalue store, that uses flash memory as a non-volatile cache between RAM and hard disk. FlashStore is designed to store the ...
Biplob Debnath, Sudipta Sengupta, Jin Li