Sciweavers

11211 search results - page 1845 / 2243
» Rank-Sensitive Data Structures
Sort
View
ECOWS
2007
Springer
15 years 8 months ago
A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language
Web services are self-contained, modular units of application logic which provide business functionality to other applications via Internet connections. Several models have been u...
Soheil Saifipoor, Behrouz Tork Ladani, Naser Nemat...
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
15 years 8 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
CGO
2004
IEEE
15 years 8 months ago
Static Identification of Delinquent Loads
The effective use of processor caches is crucial to the performance of applications. It has been shown that cache misses are not evenly distributed throughout a program. In applic...
Vlad-Mihai Panait, Amit Sasturkar, Weng-Fai Wong
ASPLOS
2006
ACM
15 years 8 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
FLAIRS
2010
15 years 6 months ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves
« Prev « First page 1845 / 2243 Last » Next »