Information Technology Reference
In-Depth Information
Tennenhouse, D. L., Smith, J. M., Sincoskie, W. D., Weth-
erall, D. J., & Minden, G. J. (1997). A Survey of Active
Network Research. IEEE Communications Magazine ,
35 (1), 80-86. doi:10.1109/35.568214
Weinand (2006). A survey of large page support . Re-
trieved from http://www.gelato.unsw.edu.au/~ianw/
litreview/report.pdf, 2006.
Wetherall, D. (1999). Active Network Vision and Reality:
Lessons From a Capsule-based System. Operating Sys-
tems Review , 34 (5), 64-79. doi:10.1145/319344.319156
Thompson, K. (1984). Reflections on trusting trust.
Communication of the ACM, 27 , 761-763.
Vahalia, U. (1996). UNIX Internals: The New Frontiers
(pp. 112-148). Upper Saddle River, NJ: Prentice Hall.
Whaley, J. (2000). A portable sampling-based profiler
for Java virtual machines. In Proceedings of ACM Java
Grand (pp. 78-87).
Vaswani, K., & Srikant, Y. N. (2003), Dynamic recom-
pilation and profile-guided optimizations for a .NET JIT
compiler. In Proceedings of the IEEE Software Special on
Rotor .NET , (Vol. 150, pp. 296-302). IEEE Publishing.
Whittle, G. A. S., Paris, J.-F., Amer, A., Long, D. D. E.,
& Burns, R. (2003). Using multiple predictors to improve
the accuracy of file access predictions. In Proceedings
of the 20th IEEE/11th NASA Goddard Conference on
Mass Storage Systems and Technologies (MSS'03) ,
(pp. 230).
Visser, E. (2001). Stratego: A language for program
transformation based on rewriting strategies . (LNCS
2051, pp. 357).
Wilander, J., & Kamkar, M. (2003). A Comparison of
Publicly Available Tools for Dynamic Buffer Overflow
Prevention. In Proceedings of the 10th Network and
Distributed System Security Symposium (NDSS'03) , San
Diego, CA, (pp. 149-162).
Waddington, D. G., & Yao, B. (2005). High fidelity C++
code transformation. In Proceedings of the 5 th Workshop
on Language Descriptions, Tools and Applications .
Waddington, D. G., Amduka, M., DaCosta, D., Foster, P.,
& Sprinkle, J. (2006, February). EASEL: Model centric
design tools for effective design and implementation
of multi-threaded concurrent applications (Technical
Document). Lockheed Martin ATL.
Williams, C. (2002). Linux Scheduler Latency . Raleigh,
NC: Red Hat Inc.
Winwood, S. J., Shuf, Y., & Franke, H. (2002). Multiple
page size support in the Linux kernel. Proceedings of
Ottawa Linux Symposium , Ottawa, Canada. Bovet, D.
P. & Cesati, M. (2003). Understanding the Linux Kernel
(2nd Ed). Sebastol, CA: O'reilly.
Wallace, R. F., Norman, R. D. & Harari, E. (2006).
Computer memory cards using flash EEPROM integrated
circuit chips and memory-controller systems . [US Patent
no. 7106609].
Winwood, S., Shuf, Y., & Franke, H. (2002, June). Multiple
Page Size Support in the Linux Kernel , Ottawa Linux
Symposium, Ottawa, Canada.
Wang, H., Zhang, D., & Shin, K. (2002). Detecting
syn flooding attacks. In Proceedings of the INFOCOM
Conference , Manhattan, NY.
Wiseman, Y. (2001). A Pipeline Chip for Quasi Arithmetic
Coding. IEICE Journal - Trans. Fundamentals, Tokyo,
Japan . E (Norwalk, Conn.) , 84-A (4), 1034-1041.
Wang, J. (2008). Improving Decision-Making Practices
Through Information Filtering. [IJIDS]. International
Journal of Information and Decision Sciences , 1 (1),
1-4.
Wiseman, Y. (2005). ARC Based SuperPag-
ing. Operating Systems Review , 39 (2), 74 -78.
doi:10.1145/1055218.1055225
Wang, Y., Beck, D., Vo, B., Roussev, R., & Verbowski,
C. (2005). Detecting stealth software with strider ghost-
buster. Proceedings of the 2005 International Confer-
ence on Dependable Systems and Networks , Yokohama,
Japan.
Wiseman, Y. (2009). Alleviating the Trashing by Adding
Medium-Term Scheduler. In Y. Wiseman & S. Jiang,
(Eds.), The Handbook of Advanced Operating Systems
Search WWH ::




Custom Search