Sciweavers

3330 search results - page 153 / 666
» software 2010
Sort
View
ACSAC
2010
IEEE
14 years 10 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
SIGCOMM
2010
ACM
15 years 1 months ago
Achieving O(1) IP lookup on GPU-based software routers
IP address lookup is a challenging problem due to the increasing routing table size, and higher line rate. This paper investigates a new way to build an efficient IP lookup scheme...
Jin Zhao, Xinya Zhang, Xin Wang, Xiangyang Xue
56
Voted
ARCS
2010
Springer
15 years 5 months ago
MLP-Aware Instruction Queue Resizing: The Key to Power-Efficient Performance
Pavlos Petoumenos, Georgia Psychou, Stefanos Kaxir...
EUROSYS
2010
ACM
15 years 5 months ago
Boom analytics: exploring data-centric, declarative programming for the cloud
Peter Alvaro, Tyson Condie, Neil Conway, Khaled El...
ECMDAFA
2010
Springer
132views Hardware» more  ECMDAFA 2010»
15 years 29 days ago
An Integrated Facet-Based Library for Arbitrary Software Components
Reuse is an important means of reducing costs and effort during the development of complex software systems. A major challenge is to find suitable components in a large library wit...
Matthias Schmidt, Jan Polowinski, Jendrik Johannes...