Sciweavers

1528 search results - page 233 / 306
» Implementing Generalized Operator Overloading
Sort
View
HPDC
2008
IEEE
15 years 4 months ago
Combining batch execution and leasing using virtual machines
As cluster computers are used for a wider range of applications, we encounter the need to deliver resources at particular times, to meet particular deadlines, and/or at the same t...
Borja Sotomayor, Kate Keahey, Ian T. Foster
CODES
2007
IEEE
15 years 4 months ago
A low power VLIW processor generation method by means of extracting non-redundant activation conditions
This paper proposes a low power VLIW processor generation method by automatically extracting non-redundant activation conditions of pipeline registers for clock gating. It is impo...
Hirofumi Iwato, Keishi Sakanushi, Yoshinori Takeuc...
CCS
2007
ACM
15 years 4 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
EMSOFT
2007
Springer
15 years 4 months ago
Uniformity improving page allocation for flash memory file systems
Flash memory is a storage medium that is becoming more and more popular. Though not yet fully embraced in traditional computing systems, Flash memory is prevalent in embedded syst...
Seungjae Baek, Seongjun Ahn, Jongmoo Choi, Donghee...
84
Voted
HASKELL
2006
ACM
15 years 3 months ago
Running the manual: an approach to high-assurance microkernel development
We propose a development methodology for designing and prototyping high assurance microkernels, and describe our application of it. The methodology is based on rapid prototyping a...
Philip Derrin, Kevin Elphinstone, Gerwin Klein, Da...