Information Technology Reference
In-Depth Information
on Intermediate Representations (IR'95) . (pp. 111-118),
San Francisco, CA, USA.
Hara, T. (2002). Cooperative caching by mobile clients
in push-based information systems. In Proceedings of
the Conference on Information and Knowledge Man-
agement .
Grassi, V. (2000). Prefetching policies for energy saving
and latency reduction in a wireless broadcast data delivery
system. In Proceedings of the International Workshop
on Modeling Analysis and Simulation of Wireless and
Mobile Systems .
Hartig, H. Hohmuth, M. Liedtke, J. Schonberg, & S.
Wolter, J. (1997). The Performance of ยต-Kernel-Based
Systems. In Proceedings of the sixteenth ACM sym-
posium on Operating systems principles , Saint Malo,
France, (p.66-77).
Gray, J., & Shenoy, P. J. (2000). Rules of Thumb in Data
Engineering. Proceedings of International Conference
on Data Engineering , 2000 , 3-12.
Herder, J. N., Bos, H., Gras, B., Homburg, P., & Tanen-
baum, A. S. (2006). Minix 3: a highly reliable, self-
repairing operating system. ACM Operating Systems
Review , 40 (3), 80-89. doi:10.1145/1151374.1151391
Greenhouse, A. (2003). A programmer-oriented ap-
proach to safe concurrency . Unpublished doctoral
dissertation, Carnegie Mellon University School of
Computer Science.
Herder, J. N., Bos, H., Gras, B., Homburg, P., & Tanen-
baum, A. S. (2007). Failure resilience for device drivers.
In The 37th Annual IEEE/IFIP International Conference
on Dependable Systems and Networks , (pp. 41-50).
Grehan, R. (1995). BYTEmark Native Mode Benchmark ,
Release 2.0, [Computer software]. BYTE Magazine.
Griffioen, J., & Appleton, R. (1994). Reducing file sys-
tem latency using a predictive approach. Proceedings
of the USENIX Summer Conference, June 1994, pp.
197-208.
Hill, J., Schmidt, D.C., & Slaby, J. (2007). System execu-
tion modeling tools for evaluating the quality of service of
enterprise distributed real-time and embedded systems .
In P. F. Tiako (Ed.). Designing software-intensive systems:
Methods and principles . Langston University, OK.
Grimm, R. (1996). Exodisk: Maximizing Application
Control Over Storage Management . Unpublished.
Hilyard, J. (2005, January). No code can hide from
the prof iling API in the .NET framework 2.0.
MSDN Magazine . Retrieved March 11, 2008, from
http://msdn.microsoft.com/msdnmag/issues/05/01/
CLRProfiler/
Guo, Y., Pinotti, M. C., et al. (2001). A new hybrid
broadcast scheduling algorithm for asymmetric com-
munication systems. SIGMOBILE Mobile Computing
and Communications Review, 5 (3), 39-54.
Hollingsworth, J. K., Miller, B. P., & Cargille, J. (1994).
Dynamic program instrumentation for scalable per-
formance tools. In Proceedings of the Scalable High-
Performance Computing Conference, Knoxville, TN ,
(pp. 841-850).
Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analy-
sis of the linux random number generator. In Proceedings
of the 2006 IEEE Symposium on Security and Privacy ,
Oakland, CA.
Hameed, S. & Vaidya, N. H. (1997). Log-time algorithms
for scheduling single and multiple channel data broad-
cast. In Proceedings of the International Conference on
Mobile Computing and Networking .
Howell, J. & Kotz, D. (2000). End-to-end authorization.
Proceedings of the 4th Symposium on Operating Systems
Design and Implementation (151 164). San Diego, CA.
Hand, S. Warfield, A. Fraser, K. Kotsovinos E. & Ma-
genheimer, D. (2005). Are Virtual Machine Monitors
Microkernels Done Right? In Proceedings of the Tenth
Workshop on Hot Topics in Operating Systems (HotOS-
X) , June 12-15, Santa-Fe, NM.
Hristea, C., Lenoski, D., & Keen, J. (1997). Measuring
Memory Hierarchy Performance of Cache-Coherent
Multiprocessors Using Micro Benchmarks. In Super-
computing, ACM/IEEE 1997 Conference , (p.45).
Search WWH ::




Custom Search