Sciweavers

5439 search results - page 1087 / 1088
» Patterns: from system design to software testing
Sort
View
TRIDENTCOM
2006
IEEE
14 years 16 hour ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
ICDCS
2005
IEEE
13 years 11 months ago
Network-Centric Buffer Cache Organization
A pass-through server such as an NFS server backed by an iSCSI[1] storage server only passes data between the storage server and NFS clients. Ideally it should require at most one...
Gang Peng, Srikant Sharma, Tzi-cker Chiueh
OOPSLA
2005
Springer
13 years 11 months ago
Quantifying the performance of garbage collection vs. explicit memory management
Garbage collection yields numerous software engineering benefits, but its quantitative impact on performance remains elusive. One can compare the cost of conservative garbage col...
Matthew Hertz, Emery D. Berger
ICCBR
2001
Springer
13 years 10 months ago
Meta-case-Based Reasoning: Using Functional Models to Adapt Case-Based Agents
It is useful for an intelligent software agent to be able to adapt to new demands from an environment. Such adaptation can be viewed as a redesign problem; an agent has some origin...
J. William Murdock, Ashok K. Goel
ASPLOS
1992
ACM
13 years 10 months ago
Parity Declustering for Continuous Operation in Redundant Disk Arrays
We describe and evaluate a strategy for declustering the parity encoding in a redundant disk array. This declustered parity organization balances cost against data reliability and...
Mark Holland, Garth A. Gibson
« Prev « First page 1087 / 1088 Last » Next »