Sciweavers

4511 search results - page 867 / 903
» Observation Based System Security
Sort
View
JSAC
2008
125views more  JSAC 2008»
14 years 9 months ago
Optimal Competitive Algorithms for Opportunistic Spectrum Access
We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter must...
Nicholas B. Chang, Mingyan Liu
SIGMETRICS
2008
ACM
175views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
DARC: dynamic analysis of root causes of latency distributions
OSprof is a versatile, portable, and efficient profiling methodology based on the analysis of latency distributions. Although OSprof has offers several unique benefits and has bee...
Avishay Traeger, Ivan Deras, Erez Zadok
CC
2002
Springer
117views System Software» more  CC 2002»
14 years 9 months ago
Online Subpath Profiling
We present an efficient online subpath profiling algorithm, OSP, that reports hot subpaths executed by a program in a given run. The hot subpaths can start at arbitrary basic block...
David Oren, Yossi Matias, Shmuel Sagiv
SIGPLAN
2002
14 years 9 months ago
Write barrier removal by static analysis
We present a new analysis for removing unnecessary write barriers in programs that use generational garbage collection. To our knowledge, this is the first static program analysis...
Karen Zee, Martin C. Rinard
TPDS
2002
127views more  TPDS 2002»
14 years 9 months ago
Adaptive Bandwidth Reservation and Admission Control in QoS-Sensitive Cellular Networks
How to keep the probability of hand-off drops within a prespecified limit is a very important Quality-of-Service (QoS) issue in cellular networks because mobile users should be abl...
Sunghyun Choi, Kang G. Shin