• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 369
Next 10 →

ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay

by George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen - In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI , 2002
"... Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Current ..."
Abstract - Cited by 469 (26 self) - Add to MetaCart
machine instruction-by-instruction. This enables it to provide arbitrarily detailed observations about what transpired on the system, even in the presence of non-deterministic attacks and executions. ReVirt adds reasonable time and space overhead. Overheads due to virtualization are imperceptible

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
-directed approach behavior, and decision making under uncertainty. Individual neurons can be studied in the reward systems of the brain, including dopamine neurons, orbitofrontal cortex, and striatum. The neural activity can be related to basic theoretical terms of reward and uncertainty, such as contiguity

Active Storage For Large-Scale Data Mining and Multimedia

by Erik Riedel, et al. , 1998
"... The increasing performance and decreasing cost of processors and memory are causing system intelligence to move into peripherals from the CPU. Storage system designers are using this trend toward "excess" compute power to perform more complex processing and optimizations inside stora ..."
Abstract - Cited by 147 (19 self) - Add to MetaCart
The increasing performance and decreasing cost of processors and memory are causing system intelligence to move into peripherals from the CPU. Storage system designers are using this trend toward "excess" compute power to perform more complex processing and optimizations inside

On trustworthiness of CPU usage metering and accounting

by Mei Liu, Xuhua Ding - Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference on , 2010
"... Abstract—In the envisaged utility computing paradigm, a user taps a service provider’s computing resources to accom-plish her tasks, without deploying the needed hardware and software in her own IT infrastructure. To make the service profitable, the service provider charges the user based on the res ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
on the resources consumed. A commonly billed resource is CPU usage. A key factor to ensure the success of such a business model is the trustworthiness of the resource metering scheme. In this paper, we provide a systematic study on the trustworthiness of CPU usage metering. Our results show that the metering

Putting the user in direct control of cpu scheduling

by Bin Lin, Peter A. Dinda, Bin Lin, Peter A. Dinda , 2006
"... CPU scheduling to enforce service-level agreements (SLAs) is a problem of key importance in service-oriented systems. For services whose ultimate customers are naive end-users, it is often a significant challenge simply to determine the terms of the SLA. We propose a new approach to both SLA specifi ..."
Abstract - Cited by 5 (4 self) - Add to MetaCart
specification and scheduling for enforcement that is unique in that it is based around the use of direct user input. Our implementation of the idea is designed for virtual machine (VM)-based computing environments. In our system, a user's VM is scheduled as a periodic real-time task. The user can

Generation of hardware modules for run-time reconfigurable hybrid CPU/FPGA systems

by Miguel L. Silva, João Canas Ferreira
"... Abstract — This paper describes a tool that creates partially-reconfigurable modules from the bitstreams of individual com-ponent modules. The resulting modules are intended for use in applications that exploit partial dynamic reconfiguration. The tool is integrated in a design flow particularly aim ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
aimed at dynamically-reconfigurable platform FPGAs. The corresponding design flow is described together with a basic run-time support system. I.

Software on Auto Billing System

by Tajrin Ishrat, Yasir Arafat
"... Abstract — Now-a-days auto billing system is widely used throughout the world. Its use is growing up day by day. There are different sectors which use auto billing system. Software on auto billing system of telephone exchange is the project work of this paper. It provides multi dimensional functions ..."
Abstract - Add to MetaCart
functions such as individual paper invoice for the subscriber, details paper invoice of all subscriber’s for office record, option of showing detail bill information such as charging rate, calling time, call duration etc. in printed form upon the subscriber’s query and more options. All the record

RT-OpenStack: CPU Resource Management for Real-Time Cloud Computing

by Sisu Xi, Chong Li, Chenyang Lu, Christopher D. Gill, Meng Xu, Linh T. X. Phan, Insup Lee, Oleg Sokolsky
"... Abstract—Clouds have become appealing platforms for not only general-purpose applications, but also real-time ones. How-ever, current clouds cannot provide real-time performance to virtual machines (VMs). We observe the demand and the ad-vantage of co-hosting real-time (RT) VMs with non-real-time (r ..."
Abstract - Add to MetaCart
levels. This paper presents RT-OpenStack, a cloud CPU resource management system for co-hosting real-time and regular VMs. RT-OpenStack entails three main contributions: (1) integration of a real-time hypervisor (RT-Xen) and a cloud management system (OpenStack) through a real-time resource interface; (2

CPU Scheduling for Statistically-Assured Real-Time Performance and Improved Energy Efficiency

by unknown authors
"... We present a CPU scheduling algorithm, called Energy-efficient Utility Accrual Algorithm (or EUA), for battery-powered, embed-ded real-time systems. We consider an embedded software ap-plication model where repeatedly occurring application activities are subject to deadline constraints specified usi ..."
Abstract - Add to MetaCart
using step time/utility functions. For battery-powered embedded systems, system-level energy consumption is also a primary concern. We consider CPU scheduling that (1) provides assurances on individual and collective application timeliness behaviors and (2) maximizes system-level timeliness and energy

CPU Gradients: Performance-aware Energy Conservation in Multitier Systems

by Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. S
"... Abstract—Dynamic voltage and frequency scaling (DVFS) and virtual machine (VM) based server consolidation are wellknown CPU scaling techniques for energy conservation that can have an adverse impact on system performance. For the responsiveness-sensitive multitier applications running in today’s dat ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Abstract—Dynamic voltage and frequency scaling (DVFS) and virtual machine (VM) based server consolidation are wellknown CPU scaling techniques for energy conservation that can have an adverse impact on system performance. For the responsiveness-sensitive multitier applications running in today’s
Next 10 →
Results 1 - 10 of 369
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University