Sciweavers

467 search results - page 50 / 94
» Simple Mechanical Control Systems with Constraints and Symme...
Sort
View
CSFW
2008
IEEE
13 years 10 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
ICAC
2009
IEEE
14 years 3 months ago
Injecting realistic burstiness to a traditional client-server benchmark
The design of autonomic systems often relies on representative benchmarks for evaluating system performance and scalability. Despite the fact that experimental observations have e...
Ningfang Mi, Giuliano Casale, Ludmila Cherkasova, ...
HPCA
1996
IEEE
14 years 1 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...
IPPS
2006
IEEE
14 years 3 months ago
Helper thread prefetching for loosely-coupled multiprocessor systems
This paper presents a helper thread prefetching scheme that is designed to work on loosely-coupled processors, such as in a standard chip multi-processor (CMP) system and in an in...
Changhee Jung, Daeseob Lim, Jaejin Lee, Yan Solihi...
COMPUTER
2004
100views more  COMPUTER 2004»
13 years 8 months ago
Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure
any benefits. Most significantly, an abstract architectural model can provide a global perspective of the system and expose important system-level properties and integrity constrai...
David Garlan, Shang-Wen Cheng, An-Cheng Huang, Bra...