Information Technology Reference
In-Depth Information
Tennenhouse, D. L., Smith, J. M., Sincoskie, W. D., Weth-
erall, D. J., & Minden, G. J. (1997). A Survey of Active
Network Research.
IEEE Communications Magazine
,
35
(1), 80-86. doi:10.1109/35.568214
Weinand (2006).
A survey of large page support
. Re-
trieved from http://www.gelato.unsw.edu.au/~ianw/
litreview/report.pdf, 2006.
Wetherall, D. (1999). Active Network Vision and Reality:
Lessons From a Capsule-based System.
Operating Sys-
tems Review
,
34
(5), 64-79. doi:10.1145/319344.319156
Thompson, K. (1984). Reflections on trusting trust.
Communication of the ACM, 27
, 761-763.
Vahalia, U. (1996).
UNIX Internals: The New Frontiers
(pp. 112-148). Upper Saddle River, NJ: Prentice Hall.
Whaley, J. (2000). A portable sampling-based profiler
for Java virtual machines. In
Proceedings of ACM Java
Grand
(pp. 78-87).
Vaswani, K., & Srikant, Y. N. (2003), Dynamic recom-
pilation and profile-guided optimizations for a .NET JIT
compiler. In
Proceedings of the IEEE Software Special on
Rotor .NET
, (Vol. 150, pp. 296-302). IEEE Publishing.
Whittle, G. A. S., Paris, J.-F., Amer, A., Long, D. D. E.,
& Burns, R. (2003). Using multiple predictors to improve
the accuracy of file access predictions. In
Proceedings
of the 20th IEEE/11th NASA Goddard Conference on
Mass Storage Systems and Technologies (MSS'03)
,
(pp. 230).
Visser, E. (2001).
Stratego: A language for program
transformation based on rewriting strategies
. (LNCS
2051, pp. 357).
Wilander, J., & Kamkar, M. (2003). A Comparison of
Publicly Available Tools for Dynamic Buffer Overflow
Prevention. In
Proceedings of the 10th Network and
Distributed System Security Symposium (NDSS'03)
, San
Diego, CA, (pp. 149-162).
Waddington, D. G., & Yao, B. (2005). High fidelity C++
code transformation. In
Proceedings of the 5
th
Workshop
on Language Descriptions, Tools and Applications
.
Waddington, D. G., Amduka, M., DaCosta, D., Foster, P.,
& Sprinkle, J. (2006, February).
EASEL: Model centric
design tools for effective design and implementation
of multi-threaded concurrent applications
(Technical
Document). Lockheed Martin ATL.
Williams, C. (2002).
Linux Scheduler Latency
. Raleigh,
NC: Red Hat Inc.
Winwood, S. J., Shuf, Y., & Franke, H. (2002). Multiple
page size support in the Linux kernel.
Proceedings of
Ottawa Linux Symposium
, Ottawa, Canada. Bovet, D.
P. & Cesati, M. (2003). Understanding the Linux Kernel
(2nd Ed). Sebastol, CA: O'reilly.
Wallace, R. F., Norman, R. D. & Harari, E. (2006).
Computer memory cards using flash EEPROM integrated
circuit chips and memory-controller systems
. [US Patent
no. 7106609].
Winwood, S., Shuf, Y., & Franke, H. (2002, June).
Multiple
Page Size Support in the Linux Kernel
, Ottawa Linux
Symposium, Ottawa, Canada.
Wang, H., Zhang, D., & Shin, K. (2002). Detecting
syn flooding attacks. In
Proceedings of the INFOCOM
Conference
, Manhattan, NY.
Wiseman, Y. (2001). A Pipeline Chip for Quasi Arithmetic
Coding.
IEICE Journal - Trans. Fundamentals, Tokyo,
Japan
.
E (Norwalk, Conn.)
,
84-A
(4), 1034-1041.
Wang, J. (2008). Improving Decision-Making Practices
Through Information Filtering. [IJIDS].
International
Journal of Information and Decision Sciences
,
1
(1),
1-4.
Wiseman, Y. (2005). ARC Based SuperPag-
ing.
Operating Systems Review
,
39
(2), 74 -78.
doi:10.1145/1055218.1055225
Wang, Y., Beck, D., Vo, B., Roussev, R., & Verbowski,
C. (2005). Detecting stealth software with strider ghost-
buster.
Proceedings of the 2005 International Confer-
ence on Dependable Systems and Networks
, Yokohama,
Japan.
Wiseman, Y. (2009). Alleviating the Trashing by Adding
Medium-Term Scheduler. In Y. Wiseman & S. Jiang,
(Eds.),
The Handbook of Advanced Operating Systems
Search WWH ::
Custom Search