Sciweavers

185 search results - page 32 / 37
» Dependability Analysis of Virtual Memory Systems
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
WOSP
2010
ACM
15 years 6 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...
125
Voted
ATAL
2003
Springer
15 years 4 months ago
Can software agents influence human relations?: balance theory in agent-mediated communities
We sought to create a social embodied conversational agent to support group interactions, using ‘balance theory’ from social science research on human-human relations. We cond...
Hideyuki Nakanishi, Satoshi Nakazawa, Toru Ishida,...
ASPLOS
2009
ACM
16 years 9 days ago
Dynamic prediction of collection yield for managed runtimes
The growth in complexity of modern systems makes it increasingly difficult to extract high-performance. The software stacks for such systems typically consist of multiple layers a...
Michal Wegiel, Chandra Krintz
STOC
2006
ACM
121views Algorithms» more  STOC 2006»
15 years 5 months ago
On adequate performance measures for paging
Memory management is a fundamental problem in computer architecture and operating systems. We consider a two-level memory system with fast, but small cache and slow, but large mai...
Konstantinos Panagiotou, Alexander Souza