Sciweavers

3865 search results - page 102 / 773
» Active memory operations
Sort
View
XMLSEC
2003
ACM
15 years 10 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
ENVSOFT
2008
106views more  ENVSOFT 2008»
15 years 5 months ago
Analysis of self-describing gridded geoscience data with netCDF Operators (NCO)
1 The netCDF Operator (NCO) software facilitates manipulation and analysis of gridded2 geoscience data stored in the self-describing netCDF format. NCO is optimized to efficiently3...
Charles S. Zender
USENIX
2008
15 years 7 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
STOC
2005
ACM
164views Algorithms» more  STOC 2005»
16 years 5 months ago
Cooperative asynchronous update of shared memory
The Write-All problem for an asynchronous shared-memory system has the objective for the processes to update the contents of a set of shared registers, while minimizing the mber o...
Bogdan S. Chlebus, Dariusz R. Kowalski
ISPASS
2007
IEEE
15 years 11 months ago
Accelerating Full-System Simulation through Characterizing and Predicting Operating System Performance
The ongoing trend of increasing computer hardware and software complexity has resulted in the increase in complexity and overheads of cycle-accurate processor system simulation, e...
Seongbeom Kim, Fang Liu, Yan Solihin, Ravi R. Iyer...