Sciweavers

948 search results - page 32 / 190
» Analysis of SITA policies
Sort
View
SIGMETRICS
1992
ACM
145views Hardware» more  SIGMETRICS 1992»
15 years 1 months ago
Analysis of the Generalized Clock Buffer Replacement Scheme for Database Transaction Processing
The CLOCK algorithm is a popular buffer replacement algorithm becauseof its simplicity and its ability to approximate the performance of the Least Recently Used (LRU) replacement ...
Victor F. Nicola, Asit Dan, Daniel M. Dias
ACSAC
2007
IEEE
15 years 4 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
MICRO
2005
IEEE
123views Hardware» more  MICRO 2005»
15 years 3 months ago
A Criticality Analysis of Clustering in Superscalar Processors
Clustered machines partition hardware resources to circumvent the cycle time penalties incurred by large, monolithic structures. This partitioning introduces a long inter-cluster ...
Pierre Salverda, Craig B. Zilles
ICSE
2009
IEEE-ACM
15 years 10 months ago
Safe-commit analysis to facilitate team software development
Software development teams exchange source code in shared repositories. These repositories are kept consistent by having developers follow a commit policy, such as "Program e...
Jan Wloka, Barbara G. Ryder, Frank Tip, Xiaoxia Re...
CCS
2006
ACM
15 years 1 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough