Sciweavers

1239 search results - page 201 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
ARC
2006
Springer
122views Hardware» more  ARC 2006»
13 years 11 months ago
UNITE: Uniform Hardware-Based Network Intrusion deTection Engine
Abstract. Current software implementations of network intrusion detection reach a maximum network connection speed of about 1Gbps (Gigabits per second). This paper analyses the Sno...
Sherif Yusuf, Wayne Luk, M. K. N. Szeto, William G...
DAC
2008
ACM
14 years 8 months ago
Cache modeling in probabilistic execution time analysis
Multimedia-dominated consumer electronics devices (such as cellular phone, digital camera, etc.) operate under soft real-time constraints. Overly pessimistic worst-case execution ...
Yun Liang, Tulika Mitra
EUROSYS
2009
ACM
14 years 4 months ago
Improving the responsiveness of internet services with automatic cache placement
The backends of today’s Internet services rely heavily on caching at various layers both to provide faster service to common requests and to reduce load on back-end components. ...
Alexander Rasmussen, Emre Kiciman, V. Benjamin Liv...
AADEBUG
2005
Springer
14 years 1 months ago
Jockey: a user-space library for record-replay debugging
Jockey is an execution record/replay tool for debugging Linux programs. It records invocations of system calls and CPU instructions with timing-dependent effects and later replays...
Yasushi Saito
EDBT
2008
ACM
138views Database» more  EDBT 2008»
13 years 9 months ago
Potential-driven load distribution for distributed data stream processing
A large class of applications require real-time processing of continuous stream data resulting in the development of data stream management systems (DSMS). Since many of these app...
Weihan Wang, Mohamed A. Sharaf, Shimin Guo, M. Tam...