Sciweavers

3330 search results - page 153 / 666
» software 2010
Sort
View
ACSAC
2010
IEEE
13 years 8 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
SIGCOMM
2010
ACM
13 years 10 months ago
Achieving O(1) IP lookup on GPU-based software routers
IP address lookup is a challenging problem due to the increasing routing table size, and higher line rate. This paper investigates a new way to build an efficient IP lookup scheme...
Jin Zhao, Xinya Zhang, Xin Wang, Xiangyang Xue
ARCS
2010
Springer
14 years 3 months ago
MLP-Aware Instruction Queue Resizing: The Key to Power-Efficient Performance
Pavlos Petoumenos, Georgia Psychou, Stefanos Kaxir...
EUROSYS
2010
ACM
14 years 3 months ago
Boom analytics: exploring data-centric, declarative programming for the cloud
Peter Alvaro, Tyson Condie, Neil Conway, Khaled El...
ECMDAFA
2010
Springer
132views Hardware» more  ECMDAFA 2010»
13 years 10 months ago
An Integrated Facet-Based Library for Arbitrary Software Components
Reuse is an important means of reducing costs and effort during the development of complex software systems. A major challenge is to find suitable components in a large library wit...
Matthias Schmidt, Jan Polowinski, Jendrik Johannes...