Sciweavers

338 search results - page 49 / 68
» The design and implementation of formal monitoring technique...
Sort
View
ASPLOS
1992
ACM
13 years 11 months ago
Application-Controlled Physical Memory using External Page-Cache Management
Next generation computer systems will have gigabytes of physical memory and processors in the 200 MIPS range or higher. While this trend suggests that memory management for most p...
Kieran Harty, David R. Cheriton
ICSE
2010
IEEE-ACM
13 years 9 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
SIGCOMM
2010
ACM
13 years 7 months ago
Privacy-preserving P2P data sharing with OneSwarm
Privacy--the protection of information from unauthorized disclosure--is increasingly scarce on the Internet, and yet increasingly important as every user becomes both a content co...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
GLVLSI
2009
IEEE
103views VLSI» more  GLVLSI 2009»
14 years 2 months ago
Enhancing bug hunting using high-level symbolic simulation
The miniaturization of transistors in recent technology nodes requires tremendous back-end tuning and optimizations, making bug fixing at later design stages more expensive. Ther...
Hong-Zu Chou, I-Hui Lin, Ching-Sung Yang, Kai-Hui ...