Sciweavers

62 search results - page 11 / 13
» Evaluating fragment construction policies for SDT systems
Sort
View
MICRO
2007
IEEE
128views Hardware» more  MICRO 2007»
15 years 3 months ago
A Framework for Providing Quality of Service in Chip Multi-Processors
The trends in enterprise IT toward service-oriented computing, server consolidation, and virtual computing point to a future in which workloads are becoming increasingly diverse i...
Fei Guo, Yan Solihin, Li Zhao, Ravishankar Iyer
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 2 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
ICFP
2002
ACM
15 years 9 months ago
Meta-programming with names and necessity
Meta-programming is a discipline of writing programs in a certain programming language that generate, manipulate or execute programs written in another language. In a typed settin...
Aleksandar Nanevski
BMCBI
2002
119views more  BMCBI 2002»
14 years 9 months ago
Microarray results: how accurate are they?
Background: DNA microarray technology is a powerful technique that was recently developed in order to analyze thousands of genes in a short time. Presently, microarrays, or chips,...
Ravi Kothapalli, Sean J. Yoder, Shrikant Mane, Tho...
ACSAC
2003
IEEE
15 years 2 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...