Dynamic compilers can optimize application code speciļ¬cally for observed code behavior. Such behavior does not have to be stable across the entire program execution to be beneļ¬...
Christian Wimmer, Marcelo Silva Cintra, Michael Be...
This paper introduces LDA-G, a scalable Bayesian approach to ļ¬nding latent group structures in large real-world graph data. Existing Bayesian approaches for group discovery (suc...
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
To sustain emerging data-intensive scientiļ¬c applications, High Performance Computing (HPC) centers invest a notable fraction of their operating budget on a specialized fast sto...
Henry M. Monti, Ali Raza Butt, Sudharshan S. Vazhk...
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...