Sciweavers

307 search results - page 43 / 62
» On the Integrity of Lightweight Checkpoints
Sort
View
96
Voted
CHI
2004
ACM
16 years 23 days ago
Personal information management
The explosion of the amount of information available in digital form has made search a hot research topic for the Information Management Community. While most of the research on s...
Ofer Bergman, Richard P. Boardman, Jacek Gwizdka, ...
111
Voted
ICSE
2008
IEEE-ACM
16 years 15 days ago
CCVisu: automatic visual software decomposition
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given s...
Dirk Beyer
76
Voted
HIPEAC
2010
Springer
15 years 9 months ago
Combining Locality Analysis with Online Proactive Job Co-scheduling in Chip Multiprocessors
Abstract. The shared-cache contention on Chip Multiprocessors causes performance degradation to applications and hurts system fairness. Many previously proposed solutions schedule ...
Yunlian Jiang, Kai Tian, Xipeng Shen
PADS
2009
ACM
15 years 7 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
99
Voted
EDBT
2009
ACM
127views Database» more  EDBT 2009»
15 years 7 months ago
Approximate substring selectivity estimation
We study the problem of estimating selectivity of approximate substring queries. Its importance in databases is ever increasing as more and more data are input by users and are in...
Hongrae Lee, Raymond T. Ng, Kyuseok Shim