Search
Now showing items 1-10 of 238
A New Model for Managing Configuration Data
(University of Wisconsin-Madison Department of Computer Sciences, 2007)
Configuration management is one of the largest causes of system and application failure. In one study, twenty four percent of Windows NT downtime was attributed to system configuration and maintenance. Furthermore, system ...
Heap Typability is NP-Complete
(University of Wisconsin-Madison Department of Computer Sciences, 2007)
Given a snapshot of a running program�s memory heap,
and a set of types representing data in the program, dynamic
heap type inference attempts to assign types to
memory locations such that certain global consistency
...
AFIQ: An Accounting Framework for Inter-Domain QoS with Limited Trust
(University of Wisconsin-Madison Department of Computer Sciences, 2007)
Design and Implementation of Signatures for Transactional Memory Systems
(University of Wisconsin-Madison Department of Computer Sciences, 2007)
TRANSACTIONAL MEMORY (TM) systems ease multithreaded application development by giving the programmer the ability to specify that some regions of code, called TRANSACTIONS, must be executed atomically. To achieve high ...
Scheduling Data Placement Activities in Grid
(University of Wisconsin-Madison Department of Computer Sciences, 2003)
Todays scientific applications have huge data requirements, and these requirements continue to increase drastically every year. Furthermore, these data are generally accessed by many users from all across the country, or ...
Attack Generation for NIDS Testing Using Natural Deduction
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it fails to recognize. For example, to avoid matching between the attack payload and the ...
On the Design and Use of Internet Sinks for Network Abuse Monitoring
(University of Wisconsin-Madison Department of Computer Sciences, 2004)
Network abuse monitoring (eg., for intrusions and denial of service attacks) is an important component in security architecture. Monitoring unused IP addresses offers opportunities to significantly improve perspective on ...
Symbolic Analysis via Semantic Reinterpretation
(University of Wisconsin-Madison Department of Computer Sciences, 2008)
In recent years, the use of symbolic analysis in systems for testing
and verifying programs has experienced a resurgence. By ``symbolic
program analysis'', we mean logic-based techniques to analyze state
changes along ...
Effective Slicing: A Generalization of Full and Relevant Slicing
(University of Wisconsin-Madison Department of Computer Sciences, 2008)
A program slice,
Serialization Sets: A Dynamic Dependence-Based Parallel Execution Model
(University of Wisconsin-Madison Department of Computer Sciences, 2008)
This paper proposes a new parallel execution model where programmers
augment a sequential program with pieces of code called
serializers that dynamically map computational operations into
serialization sets of dependent ...










