Information Technology Reference
In-Depth Information
2008, from http://developers.sun.com/solaris/articles/
tnf.html
for database transaction processing. ACM SIGMET-
RICS Performance Evaluation Review , 20 (1), 35-46.
doi:10.1145/149439.133084
Myricom: Pioneering high performance computing . (n.d.).
Retrieved from http://www.myri.com
Nikolopoulos, D. S. (2003). Malleable Memory Mapping:
User-Level Control of Memory Bounds for Effective
Program Adaptation. In Proceedings of the 17th Interna-
tional Parallel and Distributed Processing Symposium
(IPDPS'2003) , Nice, France, April 22-26, [CD-ROM].
Los Alamitos, CA: IEEE.
Navarro, J. (2004). Transparent operating system support
for superpages , Ph.D. Thesis, Department of Computer
Science, Rice University.
Navarro, J., Iyer, S., Druschel, P., & Cox, A. (2002).
Practical, Transparent Operating System Support for
Superpages . Fifth Symposium on Operating Systems
Design and Implementation (OSDI '02), Boston, USA.
Ganapathy, N. & Schimmel, C. (1998). General purpose
operating system support for multiple page sizes. In
Proceedings of the USENIX Annual Technical Confer-
ence , New Orleans.
Nimmer, J., & Ernst, M. D. (2001). Static verification of
dynamically detected program invariants: Integrating
Daikon and ESC/Java. In Proceedings of the 1 st Inter-
national Workshop on Runtime Verification. .
Norcott, W. (2001). Iozone benchmark . Retrieved from
http://www.iozone.org
Necula, G. C., McPeak, S., Rahul, S. P., & Weimer, W.
(2002). Cil: Intermediate language and tools for analysis
and transformation of c programs. In Proceedings of the
11th International Conference on Compiler Construction,
Grenoble, France.
NT Security (2005). Network strategy report: Windows
NT security. Retrieved on January 5, 2005 from http://
www.secinf.net/windows_security/Network_Strat-
egy_Report_Windows_NT_Security.html
O'Neil, E., O'Neil, P., & Weikum, G. (1993). The LRU-K
Page Replacement Algorithm for Database Disk Buffer-
ing . Proceedings of SIGMOD `93, Washington, DC.
Nethercote, N. (2004). Dynamic binary analysis and
instrumentation . Unpublished doctoral dissertation,
University of Cambridge, UK.
Object Computing Incorporated. (2006). A window
into your systems [Electronic media]. Retrieved March
11, 2008, from http://www.ociweb.com/products/OVA-
TION
Nethercote, N., & Seward, J. (2007). Valgrind: A Frame-
work for Heavyweight Dynamic Binary Instrumentation.
In Proceedings of ACM SIGPLAN 2007 Conference on
Programming Language Design and Implementation
(PLDI 2007), San Diego, CA.
OMG. (2002). Object Management Group: the common
object request broker: Architecture and specification,
revision 3.0. OMG Technical Documents, 02-06-33
[Electronic media]. Retrieved March 11, 2008, from http://
www.omg.org/cgi-bin/doc?formal/04-03-01
Nick, J., Petroni, L., & Hicks, M. (2007). Automated
detection of persistent kernel control-flow attacks. In
Proceedings of the 14th ACM conference on Computer
and Communications Security, Alexandria, VA.
Ousterhout, J. (1989). Why Aren't Operating Systems Get-
ting Faster as Fast as Hardware . Unpublished. Carver,
L., Chen, B., & Reyes, B. (1998). Practice and Technique
in Extensible Operating Systems . Manuscript submitted
for publication. Engler, D. R. (1998). The Exokernel
Operating System Architecture . Unpublished.
Nick, J., Petroni, L., Fraser, T., Walters, A., & Arbaugh,
W. A. (2006). An architecture for specification-based
detection of semantic integrity violations in kernel
dynamic data. In Proceedings of the USENIX Security
Symposium, Vancouver, Canada.
Nicola, V. F., Dan, A., & Diaz, D. M. (1992). Analysis
of the generalized clock buffer replacement scheme
Packetstorm . (n.d.). Retrieved from http://packetstorm-
security.org/UNIX/penetration/rootkits/.
Search WWH ::




Custom Search