Information Technology Reference
In-Depth Information
Kogge, P. M. (1981). The Architecture of Pipelined
Computers. New-York: McGraw-Hill.
Lee, S., Carney, D., et al. (2003). Index hint for on-demand
broadcasting. In P r of c e e d i n g s of f t h e I n t e r n a t i of n a l C of n f e r -
ence on Data Engineering .
Komarinski, M. F., & Collett, C. (1998). Linux System
Administration Handbook . Upper Saddle River, NJ:
Prentice Hall.
Lemos, R. (2003). Cracking Windows passwords in sec-
onds. CNET News.com. Retrieved July 22, 2003 from
http://news.zdnet.com/2100-1009_22-5053063.html
Kroeger, T. M., & Long, D. D. E. (2001). Design and
implementation of a predictive file prefetching algorithm.
In Proceedings of the General Track: 2002 USENIX An-
nual Technical Conference , (pp. 105-118).
Leschke, T. (2004). Achieving speed and flexibility by
separating management from protection: embracing the
Exokernel operating system. Operating Systems Review ,
38 (4), 5-19. doi:10.1145/1031154.1031155
Kuhn, B. (2004). The Linux real time interrupt patch .
Retrieved from http://linuxdevices.com/articles/
AT61050 45931.ht m l.
Leschke, T. R. (2004). Achieving Speed and Flexibility
by Separating Management From Protection: Embracing
the Exokernel Operating System. Operating Systems
Review , 38 (4), 5-19. doi:10.1145/1031154.1031155
Lampson, B. (1974). Protection. SIGOPS Operating
System Review, 8 , 18-24.
Li, C., & Shen, K. (2005). Managing prefetch memory for
data-intensive online servers. In Proceedings of the 4th
conference on USENIX Conference on File and Storage
Technologies , (pp. 19).
Lampson, B. (2004). Computer security in the real world.
IEEE Computer, 37 , 37-46.
Larus, J., & Schnarr, E. (1995). EEL: Machine-indepen-
dent executable editing. In Proceedings of the ACM SIG
PLAN Conference on Programming Language Designes
and Implementation , (pp. 291-300).
Li, C., Shen, K., & Papathanasiou, A. E. (2007). Competi-
tive prefetching for concurrent sequential i/o. In Proceed-
ings of the ACM SIGOPS/EuroSys European Conference
on Computer Systems 2007 , (pp. 189-202).
Lau, W. H. O., Kumar, M., et al. (2002). A cooperative
cache architecture in support of caching multimedia
objects in MANETs. In Proceedings of the International
Symposium on a World of Wireless, Mobile and Multi-
media Networks .
Li, J. (2002). Monitoring of component-based systems
(Tech. Rep. No. HPL-2002-25R1. HP). Laboratories,
Palo Alto, CA, USA.
Li, Z., Chen, Z., & Zhou, Y. (2005). Mining block correla-
tions to improve storage performance. ACM Transactions
on Storage , 1 , 213-245. doi:10.1145/1063786.1063790
Lazowska, E. D., & Kelsey, J. M. (1978). Notes on Tuning
VAX/VMS . Technical Report 78-12-01. Dept. of Computer
Science, Univ. of Washington.
Li, Z., Chen, Z., Srinivasan, S., & Zhou, Y. (2004). C-
Miner: Mining Block Correlations in Storage Systems.
Proceedings of 3rd USENIX Conference on File and
Storage Technologies (FAST04), March 2004.
Lee, D., Choi, J., Kim, J.-H., Noh, S. H., Min, S. L., Cho,
Y., & Kim, C. S. (2001). LRFU: A spectrum of policies
that subsumes the least recently used and least frequently
used policies. IEEE Transactions on Computers , 50 (12),
1352-1360. doi:10.1109/TC.2001.970573
Li, Z., Lu, S., Myagmar, S., & Zhou, Y. (2004). CP-
Miner: A Tool for Finding Copy-paste and Related Bugs
in Operating System Code. In The 6th Symposium on
Operating Systems Design and Implementation (OSDI
'04) , San Francisco, CA.
Lee, E. A. (2006). The problem with threads. IEEE
Computer , 39 (11), 33-42.
Lee, H. B. (1997, July). BIT: Bytecode instrumenting tool .
Unpublished master's thesis, University of Colorado,
Boulder, CO.
Liang, S., Jiang, S., & Zhang, X. (2007). STEP: Sequen-
tiality and Thrashing Detection Based Prefetching to
Search WWH ::




Custom Search