Information Technology Reference
In-Depth Information
Fernandez, M., & Espasa, R. (1999). Dixie: A retargetable
binary instrumentation tool. In Proceedings of the Work-
shop on Binary Translation, held in conjunction with the
International Conference on Parallel Architectures and
Compilation Techniques .
In Proceedings of the Network and Distributed Systems
Security Symposium , San Diego, CA.
Gent, I. (1998). Heuristic Solution of Open Bin Pack-
ing Problems. Journal of Heuristics , 3 , 299-304.
doi:10.1023/A:1009678411503
Franklin, M., & Zdonik, S. (1996). Dissemination-based
information systems. IEEE Data Engineering Bulletin,
19 (3), 20-30.
Geppert, L. (2003). The New Indelible Memo-
ries. IEEE Spectrum , 40 (3), 48-54. doi:10.1109/
MSPEC. 20 03.118 4 436
Frantzen, M., & Shuey, M. (2001). StackGhost: Hardware
facilitated stack protection. In Proceedings of the 10th
conference on USENIX Security Symposium - Washing-
ton, D.C. (Vol. 10, p. 5).
Gifford, D. K. (1990). Polychannel systems for mass
digital communications. Communications of ACM,
33 (2), 141-151.
Gill, B. S., & Bathen, L. A. D. (2007). Optimal
multistream sequential prefetching in a shared
cache. ACM Transactions on Storage , 3 (3), 10.
doi:10.1145/1288783.1288789
Fraser, K., Hand, S., Neugebauer, R., Pratt, I., Warfield,
A., & Williamson, M. (2004). Safe hardware access
with the Xen virtual machine monitor. In Workshop on
Operating System and Architectural Support for the
On-Demand IT Infrastructure .
Gill, B. S., & Modha, D. S. (2005). Sarc: sequential
prefetching in adaptive replacement cache. Proceedings
of the USENIX Annual Technical Conference 2005 on
USENIX Annual Technical Conference , (pp. 33-33).
Freund, S. N., & Qadeer, S. (2003). Checking concise
specifications of multithreaded software . Technical Note
01-2002, Williams College.
Gontla, P., Drury, H., & Stanley, K. (2003, May 2003).
An introduction to OVATION—Object viewing and
analysis tool for integrated object networks. CORBA
News Brief, Object Computing Inc . [Electronic media].
Retrieved March 11, 2008, from http://www.ociweb.com/
cnb/CORBANewsBrief-200305.html
Friedman, M. B. (1999). Windows NT Page Replacement
Policies. In Proceedings of 25th International Computer
Measurement Group Conference , (pp. 234-244).
Fuchs, P., & Pemmasani, G. (2005). NdisWrapper . Re-
trieved from http://ndiswrapper.sourceforge.net/
Galvin, P. B., & Silberschatz, A. (1998). Operating Sys-
tem Concepts (6 th Ed.). Harlow, MA: Addison Wesley
Longman.
Gonzalez, A., Valero, M., Topham, N., & Parcerisa, J.
M. (1997). Eliminating Cache Conflict Misses through
XOR-Based Placement Functions. In Proceedings of the
International Conference on Supercomputing , Vienna,
Austria, July 7-11, (pp. 76-83). New-York: ACM.
Ganger, G., & Kaashoek, F. (1997). Embedded Inodes and
Explicit Groups: Exploiting Disk Bandwidth for Small
Files. USENIX Annual Technical Conference.
Gorman, M. (2004). Understanding The Linux Virtual
Memory Management (Bruce Peren's Open Book Se-
r ies).
Ganger, G., Engler, D., Kaashoek, M. F., Briceño, H.,
Hunt, R., & Pinckney, T. (2002). Fast and Flexible
Application-level Networking on Exokernel Systems.
ACM Transactions on Computer Science , 20 (1), 49-83.
doi:10.1145/505452.505455
Gorman, M. (2004). Understanding The Linux Virtual
Memory Manager. Upper Saddle River, NJ: Prentice
Hall, Bruce Perens' Open Source Series.
Garfinkel, T., & Rosenblum, M. (2003). A virtual machine
introspection based architecture for intrusion detection.
Gosling J. (1995, January 23). Java intermediate byte-
codes. In Proceedings of the ACM SIGPLAN Workshop
Search WWH ::




Custom Search