Sciweavers

232 search results - page 5 / 47
» On Characterizing the Data Access Complexity of Programs
Sort
View
CAISE
1999
Springer
15 years 2 months ago
A Practical Approach to Access Heterogeneous and Distributed Databases
A common problem within most large corporations nowadays is the diversity of database systems that are employed by their many departments in the development of a product. Usually, ...
Fernando de Ferreira Rezende, Ulrich Hermsen, Geor...
HPCC
2007
Springer
15 years 4 months ago
Towards a Complexity Model for Design and Analysis of PGAS-Based Algorithms
Many new Partitioned Global Address Space (PGAS) programming languages have recently emerged and are becoming ubiquitously available on nearly all modern parallel architectures. PG...
Mohamed Bakhouya, Jaafar Gaber, Tarek A. El-Ghazaw...
CCS
2010
ACM
14 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
96
Voted
MASCOTS
2004
14 years 12 months ago
Mining Performance Data from Sampled Event Traces
The prominent role of the memory hierarchy as one of the major bottlenecks in achieving good program performance has motivated the search for ways of capturing the memory performa...
Ricardo Portillo, Diana Villa, Patricia J. Teller,...
ICDAR
2003
IEEE
15 years 3 months ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...