Information Technology Reference
In-Depth Information
and Kernel Applications: Techniques and Technologies .
Hershey, PA: IGI Global.
Wyatt, D. (1997). Shared Libraries in an Exokernel
Operating System . Unpublished.
Wiseman, Y., & Feitelson, D. G. (2003). Paired Gang
Scheduling. IEEE Transactions on Parallel and
Distributed Systems , 14 (6), 581-592. doi:10.1109/
TPDS.2003.1206505
Xu, B., & Wolfson, O. (2004). Data management in
mobile peer-to-peer networks. In Proceedings of the
International Workshop on Databases, Information
Systems and Peer-to-Peer Computing .
Wiseman, Y., Schwan, K., & Widener, P. (2004). Ef-
ficient End to End Data Exchange Using Configurable
Compression. In Proc. The 24th IEEE Conference on
Distributed Computing Systems (ICDCS 2004) , Tokyo,
Japan, (pp. 228-235).
Xu, J., Hu, Q., et al. (2000). SAIU: An efficient cache
replacement policy for wireless on-demand broadcasts.
In Proceedings of the Conference on Information and
Knowledge Management .
Xu, J., Hu, Q., et al. (2004). Performance evaluation of
an optimal cache replacement policy for wireless data
dissemination. IEEE Transactions on Knowledge and
Data Engineering, 16 (1), 125-139.
Wolf, F., & Mohr, B. (2003). Hardware-counter based
automatic performance analysis of parallel programs.
In Proceedings of the Mini-symposium on Performance
Analysis, Conference on Parallel Computing (PARCO) .
Dreseden, Germany.
Yegneswaran, V., Barford, P. & Ullrich, J. (2003). Inter-
net intrusions: Global characteristics and prevalence,
138-147. New York: ACM Press.
Wood, C., Fernandez, E. B., & Lang, T. (1983). Minimi-
zation of Demand Paging for the LRU Stack Model of
Program Behavior. Information Processing Letters , 16 ,
99-104. doi:10.1016/0020-0190(83)90034-0
Yin, L., & Cao, G. (2004). Supporting cooperative
caching in ad hoc networks. In Proceedings of the IEEE
Conference on Computer Communications .
Wright C., Cowan C., Morris J., Smalley S. & Kroah-
Hartman G. (2002). Linux security modules: General
security support for the Linux kernel. Proceedings of
Usenix 2002.
Zahorjan, J., Lazowsk, E., & Eager, D. (1991). The
Effect of Scheduling Discipline on Spin Overhead in
Shared Memory Multiprocessors. IEEE Transactions
on Parallel and Distributed Systems , 2 (2), 180-198.
doi:10.1109/71.89064
Wu, F., Xi, H., & Xu, C. (2008). On the design of a new linux
readahead framework. ACM SIGOPS Operating Systems
Review , 42 (5), 75-84. doi:10.1145/1400097.1400106
Zhang, X., van Doorn, L., Jaeger, T., Perez, R., & Sailer,
R. (2002). Secure coprocessor-based intrusion detection.
In Proceedings of the 10th workshop on ACM SIGOPS
European workshop , St-Emilion, France.
Wu, F., Xi, H., Li, J., & Zou, N. (2007). Linux reada-
head: less tricks for more. In . Proceedings of the Linux
Symposium , 2 , 273-284.
Zheng, B., & Lee, D. L. (2005). Information dissemina-
tion via wireless broadcast. Communications of ACM,
48 (5), 105-110.
Wu, W., & Tan, K.-L. (2005). Cooperative prefetching
strategies for mobile peers in a broadcast wnvironment. In
Proceedings of the International Workshop on Databases,
Information Systems and Peer-to-Peer Computing .
Zheng, B., Wu, X., et al. (2005). TOSA: A near-optimal
scheduling algorithm for multi-channel data broadcast.
In Proceedings of the 6th International Conference on
Mobile Data Management , Ayia Napa, Cyprus.
Wu, W., & Tan, K.-L. (2006). Global cache management
in non-uniform mobile broadcast. In Proceedings of the
International Conference on Mobile Data Management ,
Nara, Japan.
Zhou, F., Condit, J., Anderson, Z., Bagrak, I., Ennals, R.,
Harren, M., et al. (2006). SafeDrive: Safe and recover-
able extensions using language-based techniques. In
Search WWH ::




Custom Search