Sciweavers

6768 search results - page 1299 / 1354
» Developing Applications Using Model-Driven Design Environmen...
Sort
View
126
Voted
SOSP
2007
ACM
15 years 11 months ago
Triage: diagnosing production run failures at the user's site
Diagnosing production run failures is a challenging yet important task. Most previous work focuses on offsite diagnosis, i.e. development site diagnosis with the programmers prese...
Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanth...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 9 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
INFOCOM
2006
IEEE
15 years 8 months ago
Dual-Resource TCP/AQM for Processing-Constrained Networks
— This paper examines congestion control issues for TCP flows that require in-network processing on the fly in network elements such as gateways, proxies, firewalls and even r...
Minsu Shin, Song Chong, Injong Rhee
98
Voted
PEPM
1994
ACM
15 years 6 months ago
Improving CPS-Based Partial Evaluation: Writing Cogen by Hand
It is well-known that self-applicable partial evaluation can be used to generate compiler generators: cogen = mix(mix;mix), where mix is the specializer (partial evaluator). Howev...
Anders Bondorf, Dirk Dussart
111
Voted
NIPS
2007
15 years 4 months ago
Congruence between model and human attention reveals unique signatures of critical visual events
Current computational models of bottom-up and top-down components of attention are predictive of eye movements across a range of stimuli and of simple, fixed visual tasks (such a...
Robert J. Peters, Laurent Itti
« Prev « First page 1299 / 1354 Last » Next »