Sciweavers

1516 search results - page 282 / 304
» Trends in Software Verification
Sort
View
CASES
2003
ACM
14 years 27 days ago
Exploiting bank locality in multi-bank memories
Bank locality can be defined as localizing the number of load/store accesses to a small set of memory banks at a given time. An optimizing compiler can modify a given input code t...
Guilin Chen, Mahmut T. Kandemir, Hendra Saputra, M...
AMKM
2003
Springer
14 years 26 days ago
Integrating External Sources in a Corporate Semantic Web Managed by a Multi-agent System
We first describe a multi-agent system managing a corporate memory in the form of a corporate semantic web. We then focus on a newly introduced society of agents in charge of wrap...
Tuan-Dung Cao, Fabien Gandon
CCS
2003
ACM
14 years 26 days ago
Monitoring and early warning for internet worms
After the Code Red incident in 2001 and the SQL Slammer in January 2003, it is clear that a simple self-propagating worm can quickly spread across the Internet, infects most vulne...
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald...
GI
2003
Springer
14 years 25 days ago
Outsourcing unter Sicherheitsaspekten - wie kann das aussehen?
: Outsourcing gewinnt im Rahmen der Verschlankung von Behörden und Unternehmen und der Konzentration auf Kernkompetenzen an Bedeutung. Sicherheitsgesichtspunkte werden dabei leide...
Michael Mehrhoff, Isabel Münch
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
14 years 22 days ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...