Sciweavers

1528 search results - page 206 / 306
» Implementing Generalized Operator Overloading
Sort
View
POS
1994
Springer
15 years 1 months ago
Concurrent Shadow Paging in the Flask Architecture
The differing requirements for concurrency models in programming languages and databases are widely diverse and often seemingly incompatible. The rigid provision of a particular c...
David S. Munro, Richard C. H. Connor, Ronald Morri...
ANCS
2007
ACM
15 years 1 months ago
Experimenting with buffer sizes in routers
Recent theoretical results in buffer sizing research suggest that core Internet routers can achieve high link utilization, if they are capable of storing only a handful of packets...
Neda Beheshti, Jad Naous, Yashar Ganjali, Nick McK...
ATAL
2009
Springer
15 years 1 months ago
Norm-based behaviour modification in BDI agents
While there has been much work on developing frameworks and models of norms and normative systems, consideration of the impact of norms on the practical reasoning of agents has at...
Felipe Rech Meneguzzi, Michael Luck
CCS
2009
ACM
15 years 1 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
PODC
2010
ACM
15 years 1 months ago
Adaptive system anomaly prediction for large-scale hosting infrastructures
Large-scale hosting infrastructures require automatic system anomaly management to achieve continuous system operation. In this paper, we present a novel adaptive runtime anomaly ...
Yongmin Tan, Xiaohui Gu, Haixun Wang