Information Technology Reference
In-Depth Information
International Symposium on Computer Architecture
(ISCA), (pp. 87-176), Santa Margherita Ligure, Italy.
Schmidt, D. C., Stal, M., Rohnert, H., & Buschmann, F.
(2000). Pattern-oriented software architecture patterns
for concurrent and networked objects . John Wiley &
Sons.
Romer, T., Voelker, G., Lee, D., Wolman, A., Wong, W.,
Levy, H., et al. (1997). Instrumentation and optimization
of Win32/Intel executables using Etch. In Proceedings
of the USENIX Windows NT Workshop .
Schmuck, F., & Haskin, R. (2002). GPFS: A Shared-Disk
File System for Large Computing Clusters. Proceedings
of USENIX Conference on File and Storage Technolo-
gies, January 2002.
Rutkowska, J. (2007). Defeating hardware based ram
acquisition. Blackhat Conference , Arlington, VA.
Scholl, A., Klein, R., & Jurgens, C. (1997). BISON: A
Fast Hybrid Procedure for Exactly Solving the One-
Dimensional Bin Packing Problem. Computers &
Operations Research , 24 , 627-645. doi:10.1016/S0305-
0548(96)00082-2
Saltzer, J. H., & Schroeder, M. D. (1975). The protection
of information in computer systems. Proceedings of the
IEEE, 63 , 1278-1308.
Saltzer, J. H., Reed, D. P., & Clark, D. D. (1984). End-
to-end arguments in system design. ACM Transactions
on Computer Systems, 2 , 277-288.
Schuba, C. L., Krsul, I. V., & Kuhn, M. G. spafford, E.
H., Sundaram, A. & Zamboni, D. (1997). Analysis of a
denial of service attack on tcp. In Proceedings of the 1997
Symposium on Security and Privacy , Oakland, CA.
Samar, V. & Schemers, R. (1995). Unified Login with
Pluggable Authentication Modules (PAM ). Request For
Comments: 86.0, Open Software Foundation (October
1995).
Shamir, A., & van Someren, N. (1999). Playing ”hide
and seek” with stored keys. In Proceedings of the Third
International Conference on Financial Cryptography ,
London, UK.
Schindler, J., & Ganger, G. R. (2000). Automated Disk
Drive Characterization. Proceeding of 2000 ACM SIG-
METRICS Conference, June 2000.
Shellcode Security Research Team. (2006). Registration
weakness in linux kernel's binary formats . Retrieved from
http://goodfellas.shellcode.com.ar/own/binfmt-en.pdf.
Schindler, J., Griffin, J. L., Lumb, C. R., & Ganger, G.
R. (2002). Track-Aligned Extents: Matching Access
Patterns to Disk Drive Characteristics. Proceedings of
USENIX Conference on File and Storage Technologies,
January 2002.
Shen, H., Joseph, M. S., et al. (2005). PReCinCt: A
scheme for cooperative caching in mobile peer-to-peer
systems. In Proceedings of the International Parallel
and Distributed Processing Symposium .
Schlosser, S. W., Schindler, J., Papadomanolakis, S.,
Shao, M., Ailamaki, A., Faloutsos, C., & Ganger, G. R.
(2005). On Multidimensional Data and Modern Disks.
Proceedings of the 4th USENIX Conference on File and
Storage Technology, December 2005.
Shivakumar, N., & Venkatasubramanian, S. (1996). Ef-
ficient indexing for broadcast based wireless systems.
Mobile Networks and Applications, 1 (4), 433-446.
Shriver, E., Small, C., & Smith, K. A. (1999). Why does
file system prefetching work? In Proceedings of the
Annual Technical Conference on 1999 USENIX Annual
Technical Conference , (pp. 71-84).
Schmid, P. (2006). 15 y e a r s of f h a r d d r i v e h i s t of r y : C a p a c i -
ties outran performance . Retrieved from http://www.
tomshardware.com/reviews/15-years-of-hard-drive-
history,1368.html
Smaragdakis, Y. (2004). General Adaptive Replacement
Policies. Proc. International Symposium on Memory
Management (pp. 108-119). New York: ACM Press.
Schmidt, D. C., Natarajan, B., Gokhale, G., Wang, N., &
Gill, C. (2002, February). TAO: A pattern-oriented object
request broker for distributed real-time and embedded
systems. IEEE Distributed Systems Online , 3 (2).
Search WWH ::




Custom Search