Sciweavers

15253 search results - page 2922 / 3051
» Integer-Programming Software Systems
Sort
View
108
Voted
SENSYS
2009
ACM
15 years 9 months ago
Macrodebugging: global views of distributed program execution
Creating and debugging programs for wireless embedded networks (WENs) is notoriously difficult. Macroprogramming is an emerging technology that aims to address this by providing ...
Tamim I. Sookoor, Timothy W. Hnat, Pieter Hooimeij...
116
Voted
CCS
2009
ACM
15 years 9 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
GLOBECOM
2009
IEEE
15 years 9 months ago
Peer-to-Peer Single Hop Distributed Hash Tables
Abstract—Efficiently locating information in large-scale distributed systems is a challenging problem to which Peer-to-Peer (P2P) Distributed Hash Tables (DHTs) can provide a hi...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
126
Voted
ISORC
2009
IEEE
15 years 9 months ago
Embedded JIT Compilation with CACAO on YARI
Java is one of the most popular programming languages for the development of portable workstation and server applications available today. Because of its clean design and typesafe...
Florian Brandner, Tommy Thorn, Martin Schoeberl
101
Voted
MICRO
2009
IEEE
132views Hardware» more  MICRO 2009»
15 years 9 months ago
EazyHTM: eager-lazy hardware transactional memory
Transactional Memory aims to provide a programming model that makes parallel programming easier. Hardware implementations of transactional memory (HTM) suffer from fewer overhead...
Sasa Tomic, Cristian Perfumo, Chinmay Eishan Kulka...
« Prev « First page 2922 / 3051 Last » Next »