Search
Now showing items 341-350 of 4210
Wait-free Regular Storage from Byzantine Components
(2005-04-05)
We present a simple, efficient, and self-contained construction of a wait-free regular register from Byzantine storage components. Our construction utilizes a novel building block, called 1-regular register, which can be ...
Using Cyclic Memory Allocation to Eliminate Memory Leaks
(2005-10-26)
We present and evaluate a new memory management technique foreliminating memory leaks in programs with dynamic memoryallocation. This technique observes the execution of the program on asequence of training inputsto find ...
Victim Migration: Dynamically Adapting Between Private and Shared CMP Caches
(2005-10-10)
Future CMPs will have more cores and greater onchip cache capacity. The on-chip cache can either be divided into separate private L2 caches for each core, or treated as a large shared L2 cache. Private caches provide low ...
MPEG-2 in a Stream Programming Language
(2005-10-22)
Image and video codecs are prevalent in multimedia applications, ranging from embedded systems, to desktop computers, to high-end servers such as HDTV editing consoles. It is not uncommon however that developers create ...
Towards Realizing the Performance and Availability Benefits of a Global Overlay Network
(2005-11-01)
Prior analyses of the benefits of routing overlays are based onplatforms consisting of nodes located primarily in North America, onthe academic Internet, and at the edge of the network. This paper isthe first global study ...
Towards the Prevention of Dyslexia
(2005-10-18)
Previous studies have shown that dyslexic individuals who supplement windowed reading practice with intensive small-scale hand-eye coordination tasks exhibit marked improvement in their reading skills. Here we examine ...
Learning to Trade with Insider Information
(2005-10-07)
This paper introduces algorithms for learning how to trade usinginsider (superior) information in Kyle's model of financial markets.Prior results in finance theory relied on the insider having perfectknowledge of the ...
Asymptotics of Gaussian Regularized Least-Squares
(2005-10-20)
We consider regularized least-squares (RLS) with a Gaussian kernel. Weprove that if we let the Gaussian bandwidth $\sigma \rightarrow\infty$ while letting the regularization parameter $\lambda\rightarrow 0$, the RLS solution ...
Automatic Software Upgrades for Distributed Systems
(2005-10-06)
Upgrading the software of long-lived, highly-available distributedsystems is difficult. It is not possible to upgrade all the nodes in asystem at once, since some nodes may be unavailable and halting thesystem for an ...
Knowledge Flow Analysis for Security Protocols
(2005-10-19)
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...