Information Technology Reference
In-Depth Information
CERT3 (2005). CERT Vulnerability Note VU#596387,
Icecast vulnerable to buffer overflow via long GET
request. US-CERT Vulnerability Notes Database. Re-
trieved on January 4, 2005 from http://www.kb.cert.
org/vuls/id/596387
Locality. Communications of the ACM , 15 (3), 185-190.
doi:10.1145/361268.361280
Coffman, E. G., Jr., Garey, M. R., & Johnson, D. S. (1997).
Approximation Algorithms for Bin Packing: A Survey. In
D. Hochbaum (ed.), Approximation Algorithms for NP-
Hard Problems, (pp. 46-93). Boston: PWS Publishing.
Chen, B. (2000). Multiprocessing with the Exokernel
Operating System . Unpublished.
Collins, R. (1997, September). In-circuit emulation:
How the microprocessor evolved over time. Dr. Dobbs
Journal . Retrieved March 11, 2008, from http://www.
rcollins.org/ddj/Sep97
Chen, H., Chen, R., Zhang, F., Zang, B., & Yew, P.-C.
( 2 0 0 6 ) . L i v e u p d a t i n g o p e r a t i n g s y s t e m s u s i n g v i r t u a l i z a -
tion. Proceedings of the 2nd international conference on
Virtual execution environments, Ottawa, Canada.
Corbato, A. (1968). Paging Experiment with the Multics
System . MIT Project MAC Report, MAC-M-384.
Chou, A., Yang, J. F., Chelf, B., Hallem, S., & Engler,
D. (2001). An Empirical Study of Operating Systems
Errors. In Proceedings of the 18th ACM, Symposium on
Operating System Principals (SOSP) , (pp. 73-88), Lake
Louise, Alta. Canada.
Cordy, R., Halpern C., & Promislow, E. (1991). TXL:
A rapid prototyping system for programming language
dialects. In Proceedings of the International Conference
on Computer Languages (Vol. 16, No. 1, pp. 97-107).
Chow, C.-Y., Leong, H. V., et al. (2004). Group-based
cooperative cache management for mobile clients in a
mobile environment. In Proceedings of the International
Conference on Parallel Processing (ICPP) .
Corporation, H. P. (1995). HP-UX 10.0 . Memory Man-
agement White Paper.
Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J.,
Bakke, P., et al. (1998). StackGuard: Automatic Adaptive
Detection and Prevention of Buffer-Overflow Attacks.
In Proceedings of the 7th USENIX Security Conference,
San Antonio, TX.
Chow, C.-Y., Leong, H. V., et al. (2005). Distributed
group-based cooperative caching in a mobile broadcast
environment. In Proceedings of the International Con-
ference on Mobile Data Management .
Dandekar, H., Purtell, A., & Schwab, S. (2002). AMP:
Experiences with Building and Exokernel-based Platform
for Active Networking. In Proceedings: DARPA Active
Networks Conference and Exposition , (pp. 77-91).
Chu, Y., & Ito, M. R. (2000). The 2-way Thrashing-
Avoidance Cache (TAC): An Efficient Instruction Cache
Scheme for Object-Oriented Languages. In Proceedings
of 17th IEEE International Conference on Computer
Design (ICCD2000) , Austin, Texas, September 17-20,
(pp. 93-98). Los Alamitos, CA: IEEE.
Dankwardt, K. (2001). Real Time and Linux, Part 3:
Sub-Kernels and Benchmarks . Retrieved from
Clarke, E. M., Grumberg, O., & Peled, D. A. (2000).
Model checking. Massachusetts Institute of Technology .
Cambridge, MA: The MIT Press.
Davies, J., Huismans, N., Slaney, R., Whiting, S., & Web-
ster, M. (2003). An aspect-oriented performance analysis
environment . AOSD'03 Practitioner Report, 2003.
Clauss, P., Kenmei, B., & Beyler, J.C. (2005, September).
The periodic-linear model of program behavior capture.
In Proceedings of Euro-Par 2005 (LNCS 3648, pp.
325-335).
Den ning, P. (1970). Vir t ual Memor y. [CSU R].
ACM Computing Surveys , 2 (3) , 153 - 18 9.
doi:10.1145/356571.356573
Denning, P. J. (1968). The Working Set Model for Program
Behavior. Communications of the ACM , 11 (5), 323-333.
doi:10.1145/363095.363141
Coffman, E. G. Jr, & Ryan, T. A. (1972). A Study of
Storage Partitioning Using a Mathematical Model of
Search WWH ::




Custom Search