Sciweavers

1131 search results - page 145 / 227
» Performance analysis of BSTs in system software
Sort
View
EDBTW
2010
Springer
15 years 6 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
WOSP
2010
ACM
15 years 6 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...
ACMSE
2009
ACM
15 years 6 months ago
A case for compiler-driven superpage allocation
Most modern microprocessor-based systems provide support for superpages both at the hardware and software level. Judicious use of superpages can significantly cut down the number...
Joshua Magee, Apan Qasem
JAVA
2001
Springer
15 years 4 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...
MEDINFO
2007
15 years 1 months ago
An Ontology-based Model of Clinical Information
In this paper we describe a model of clinical information designed to make health information systems properly interoperable and safely computable. The model is a response to a nu...
Thomas Beale, Sam Heard