Sciweavers

581 search results - page 31 / 117
» policy 2009
Sort
View
GROUP
2009
ACM
14 years 3 months ago
Lazy scheduling of processing and transmission tasks in collaborative systems
A collaborative system must perform both processing and transmission tasks. We present a policy for scheduling these tasks on a single core that is inspired by studies of human pe...
Sasa Junuzovic, Prasun Dewan
CATA
2009
13 years 10 months ago
Performance Enhancement of Web Server System
The invention of the Internet has ushered in advances in information era which has revolutionized the way we conduct business, advances our knowledge and promote life long learning...
Sarah Tasneem, Reda A. Ammar, Lester Lipsky, Howar...
MICRO
2009
IEEE
191views Hardware» more  MICRO 2009»
14 years 3 months ago
Pseudo-LIFO: the foundation of a new family of replacement policies for last-level caches
Cache blocks often exhibit a small number of uses during their life time in the last-level cache. Past research has exploited this property in two different ways. First, replacem...
Mainak Chaudhuri
CCS
2009
ACM
14 years 9 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
SIGCOMM
2009
ACM
14 years 3 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...