Sciweavers

668 search results - page 91 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
RV
2009
Springer
101views Hardware» more  RV 2009»
15 years 9 months ago
DMaC: Distributed Monitoring and Checking
Abstract. We consider monitoring and checking formally specified properties in a network. We are addressing the problem of deploying the checkers on different network nodes that ...
Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo, Insup ...
122
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Anti-Phishing in Offense and Defense
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
Chuan Yue, Haining Wang
ADBIS
2008
Springer
131views Database» more  ADBIS 2008»
15 years 9 months ago
Increasing Expressiveness of Composite Events Using Parameter Contexts
The event-condition-action paradigm (also known as triggers or ECA rules) gives a database “active” capabilities – the ability to react automatically to changes in the databa...
Indrakshi Ray, Wei Huang
DATE
2007
IEEE
142views Hardware» more  DATE 2007»
15 years 9 months ago
Optimizing instruction-set extensible processors under data bandwidth constraints
We present a methodology for generating optimized architectures for data bandwidth constrained extensible processors. We describe a scalable Integer Linear Programming (ILP) formu...
Kubilay Atasu, Robert G. Dimond, Oskar Mencer, Way...
128
Voted
ICAC
2007
IEEE
15 years 9 months ago
Time-Sharing Parallel Applications with Performance Isolation and Control
Most parallel machines, such as clusters, are spaceshared in order to isolate batch parallel applications from each other and optimize their performance. However, this leads to lo...
Bin Lin, Ananth I. Sundararaj, Peter A. Dinda