Information Technology Reference
In-Depth Information
Jacob, B. (2002). Virtual Memory Systems and TLB
Structures. In Computer Engineering Handbook . Boca
Raton, FL: CRC Press.
Jouppi, N. P., & Wall, D. W. (1989). Available Instruction
Level Parallelism for Superscalar and Superpipelined
Machines. In Proc. Third Conf. On Architectural Sup-
port for Programming Languages and Operation System
IEEE/ACM, Boston, (pp. 82-272).
Jiang, S. (2009). Swap Token: Rethink the Application
of the LRU Principle on Paging to Remove System
Thrashing. In Y. Wiseman & S. Jiang, (Eds.), The
Handbook of Advanced Operating Systems and Kernel
Applications: Techniques and Technologies . Hershey,
PA: IGI Global.
Kadrich, M. (2007). Endpoint security . New York:
Addison-Wesley Professional.
Karp, R. M. (1972). Reducibility Among Combinato-
rial Problems. In R.E. Miller & J.M. Thatcher, (Eds.)
Complexity of Computer Computations , (pp. 85-103).
New York: Plenum Press.
Jiang, S., & Zhang, X. (2001). Adaptive Page Replace-
ment to Protect Thrashing in Linux. In Proceedings of
t h e 5 th USENIX Annual Linux Showcase and Conference,
(ALS'01) , Oakland, California, November 5-10, (pp. 143-
151). Berkeley, CA: USENIX.
Karsten, W. (n.d.). Fedora Core 2, SELinux FAQ. Re-
trieved on January 5, 2005 from http://fedora.redhat.com/
docs/selinux-faq-fc2/index.html#id3176332
Jiang, S., & Zhang, X. (2002). LIRS: An Efficient Low
Inter-reference Recency Set Replacement Policy to
Improve Buffer Cache Performance. In Proceeding of
2002 ACM SIGMETRICS , Marina Del Rey, California,
(pp. 31-42).
Kenah, L. J., & Bate, S. F. (1984). VAX/VMS Internals
and Data Structures . Digital Press.
Kerberos1 (n.d.). Kerberos: the Network Authentication
Protocol. Retrieved January 5, 2005 from http://web.mit.
edu/kerberos/www/
Jiang, S., & Zhang, X. (2002). TPF: a System Thrashing
Protection Facility. Software, Practice & Experience ,
32 (3), 295-318. doi:10.1002/spe.437
Khalidi, Y. A., Talluri, M., Nelson, M. N., & Williams,
D. (1993). Virtual memory support for multiple page
sizes. In Proceedings of the Fourth IEEE Workshop on
Workstation Operating Systems , Napa, CA, October.
Jiang, S., & Zhang, X. (2005). Token-ordered LRU: An
Effective Page Replacement Policy and Implementation
in Linux systems. Performance Evaluation , 60 (1-4),
5-29. doi:10.1016/j.peva.2004.10.002
Kiczale, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm,
J., & Griswold, W. G. (2001). An overview of AspectJ .
(LNCS, 2072, pp. 327-355).
Jiang, S., Chen, F., & Zhang, X. (2005). CLOCK-Pro: an
Effective Improvement of the CLOCK Replacement. In
Proceedings of 2005 USENIX Annual Technical Confer-
ence , (pp. 323-336), Anaheim, CA.
Kim, J., Choi, J., Kim, J., Noh, S., Min, S., Cho, Y., &
Kim, C. (2000). A Low-Overhead, High-Performance
Unified Buffer Management Scheme that Exploits
Sequential and Looping References. In 4th Symposium
on Operating System Design and Implementation , San
Diego, California, (pp. 119-134).
Johnson, T., & Shasha, D. (1994). 2Q: A Low Overhead
High Performance Buffer Management Replacement
Algorithm. In International Conference on Very Large
Data Bases , (pp. 439-450).
Klein, S. T., & Wiseman, Y. (2003). Parallel Huffman
Decoding with Applications to JPEG Files. The Computer
Journal , 46 (5), 487-497. doi:10.1093/comjnl/46.5.487
Johnson, T., & Shasha, D. (1994). 2Q: a low overhead high
performance buffer management replacement algorithm.
In Proceedings of the Twentieth International Conference
on Very Large Databases, VLDB' 94 , Santiago, Chile,
(pp. 439-450).
Koch, H.-J. (2008). The Userspace I/O HOWTO. Revision
0.5. In Linux kernel DocBook documentation .
Search WWH ::




Custom Search