Sciweavers

2805 search results - page 72 / 561
» Collecting More Garbage
Sort
View
108
Voted
ICFP
1998
ACM
15 years 5 months ago
Intensional Polymorphism in Type-Erasure Semantics
Intensional polymorphism, the ability to dispatch to different routines based on types at run time, enables a variety of advanced implementation techniques for polymorphic languag...
Karl Crary, Stephanie Weirich, J. Gregory Morriset...
74
Voted
PLDI
1990
ACM
15 years 4 months ago
Representing Control in the Presence of First-Class Continuations
Languages such as Scheme and Smalltalk that provide continuations as first-class data objects present a challenge to efficient implementation. Allocating activation records in a h...
Robert Hieb, R. Kent Dybvig, Carl Bruggeman
91
Voted
IFIP
2010
Springer
15 years 4 months ago
Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation
Abstract Flow Accounting is a passive monitoring mechanism implemented in routers that gives insight into trac behavior and network characteristics. However, processing of Flow Ac...
Jochen Kögel, Sebastian Scholz
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
15 years 4 months ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
DEBS
2008
ACM
15 years 2 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch