Sciweavers

2746 search results - page 175 / 550
» Application performance on the Direct Access File System
Sort
View
CGO
2008
IEEE
15 years 10 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss
PERCOM
2011
ACM
14 years 7 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
154
Voted
JOT
2008
100views more  JOT 2008»
15 years 4 months ago
Panda: a Pattern-based Programming System for Automatic Code Generation
This article provides an overview of a pattern-based programming system, named Panda, for automatic generation of high-level programming language code. Many code generation system...
Daniele Mazzeranghi
141
Voted
TVCG
2012
167views Hardware» more  TVCG 2012»
13 years 6 months ago
Wellformedness Properties in Euler Diagrams: Which Should Be Used?
— Euler diagrams are often used to visualize intersecting data sets in applications such as criminology; genetics, medicine and computer file systems. One interesting aspect of t...
Peter Rodgers, Leishi Zhang, Helen C. Purchase
STORAGESS
2005
ACM
15 years 9 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...