Sciweavers

146 search results - page 23 / 30
» Sequential Traitor Tracing
Sort
View
IWPC
2006
IEEE
15 years 10 months ago
Dynamic Analysis of Software Systems using Execution Pattern Mining
Software system analysis for extracting system functionality remains as a major problem in the reverse engineering literature and the early approaches mainly rely on static proper...
Hossein Safyallah, Kamran Sartipi
IAT
2005
IEEE
15 years 9 months ago
An Approximate Pareto Optimal Cooperative Negotiation Model for Multiple
Cooperative negotiation is proved to be an effective paradigm to solve complex dynamic multi-objective problems in which each objective is associated to an agent. When the multi-o...
Nicola Gatti, Francesco Amigoni
FAST
2010
15 years 6 months ago
Extending SSD Lifetimes with Disk-Based Write Caches
We present Griffin, a hybrid storage device that uses a hard disk drive (HDD) as a write cache for a Solid State Device (SSD). Griffin is motivated by two observations: First, HDD...
Gokul Soundararajan, Vijayan Prabhakaran, Mahesh B...
FAC
2006
92views more  FAC 2006»
15 years 4 months ago
Action Refinement Applied to Late Decisions
In modular approaches to specify concurrent systems a system is built up from components using various operators as e.g. the sequential, the parallel, or the choice (+) operator. U...
Harald Fecher, Mila E. Majster-Cederbaum
PVLDB
2010
164views more  PVLDB 2010»
15 years 2 months ago
FlashStore: High Throughput Persistent Key-Value Store
We present FlashStore, a high throughput persistent keyvalue store, that uses flash memory as a non-volatile cache between RAM and hard disk. FlashStore is designed to store the ...
Biplob Debnath, Sudipta Sengupta, Jin Li