Sciweavers

8009 search results - page 1551 / 1602
» cans 2005
Sort
View
MMMACNS
2005
Springer
15 years 5 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
NOSSDAV
2005
Springer
15 years 5 months ago
Weather forecasting: predicting performance for streaming video over wireless LANs
The growth of wireless LANs has brought the expectation for high-bitrate streaming video to wireless PCs. However, it remains unclear how wireless channel characteristics impact t...
Mingzhe Li, Feng Li, Mark Claypool, Robert E. Kini...
OOPSLA
2005
Springer
15 years 5 months ago
Relational queries over program traces
Instrumenting programs with code to monitor runtime behavior is a common technique for profiling and debugging. In practice, instrumentation is either inserted manually by progra...
Simon Goldsmith, Robert O'Callahan, Alexander Aike...
OOPSLA
2005
Springer
15 years 5 months ago
Quantifying the performance of garbage collection vs. explicit memory management
Garbage collection yields numerous software engineering benefits, but its quantitative impact on performance remains elusive. One can compare the cost of conservative garbage col...
Matthew Hertz, Emery D. Berger
OOPSLA
2005
Springer
15 years 5 months ago
Demand-driven points-to analysis for Java
We present a points-to analysis technique suitable for environments with small time and memory budgets, such as just-in-time (JIT) compilers and interactive development environmen...
Manu Sridharan, Denis Gopan, Lexin Shan, Rastislav...
« Prev « First page 1551 / 1602 Last » Next »