Sciweavers

2726 search results - page 476 / 546
» Application security support in the operating system kernel
Sort
View
KBSE
1999
IEEE
15 years 2 months ago
Automatic Software Clustering via Latent Semantic Analysis
The paper describes the initial results of applying Latent Semantic Analysis (LSA) to program source code and associated documentation. Latent Semantic Analysis is a corpus-based ...
Jonathan I. Maletic, Naveen Valluri
HICSS
1996
IEEE
123views Biometrics» more  HICSS 1996»
15 years 1 months ago
Concurrency: A Case Study in Remote Tasking and Distributed IPC
Remote tasking encompasses different functionality, such as remote forking, multiple remote spawning, and task migration. In order to overcome the relatively high costs of these m...
Dejan S. Milojicic, Alan Langerman, David L. Black...
WSC
2007
15 years 3 days ago
Reflective simulation for on-line workload planning and control
Since its beginning, simulation has been used to study complex systems in order to infer on their future behavior, in this field several applications have been made using it as of...
Roberto Revetria, Flavio Tonelli
HPCA
2012
IEEE
13 years 5 months ago
Pacman: Tolerating asymmetric data races with unintrusive hardware
Data races are a major contributor to parallel software unreliability. A type of race that is both common and typically harmful is the Asymmetric data race. It occurs when at leas...
Shanxiang Qi, Norimasa Otsuki, Lois Orosa Nogueira...
HPDC
2010
IEEE
14 years 11 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim