Now showing items 1-20 of 297

    • A Characterization of Compound Documents on the Web 

      Lara, Eyal de; Wallach, Dan S.; Zwaenepoel, Willy (1999-11-29)
      Recent developments in office productivity suites make it easier for users to publish rich {\em compound documents\/} on the Web. Compound documents appear as a single unit of information but may contain data generated by ...
    • A Comparison of Software Architectures for E-business Applications 

      Cecchet, Emmanuel; Chanda, Anupam; Elnikety, Sameh; Marguerite, Julie; Zwaenepoel, Willy (2002-02-20)
      As dynamic content has become more prevalent on the Web, a number of standard mechanisms have evolved to generate such dynamic content. We study three specific mechanisms in common use: PHP, Java servlets, and Enterprise ...
    • A Deterministic Model for Parallel Program Performance Evaluation 

      Adve, Vikram S.; Vernon, Mary K. (1998-12-03)
      Analytical models for parallel programs have been successful at providing simple qualitative insights and bounds on scalability, but have been less successful in practice for predicting detailed, quantitative information ...
    • A Graphical Multistage Calculus 

      Ellner, Stephan; Taha, Walid (2005-07-22)
      While visual programming languages continue to gain popularity in domains ranging from scientific computing to real-time systems, the wealth of abstraction mechanisms, reasoning principles, and type systems developed over ...
    • A Hierarchical Region-Based Static Single Assignment Form 

      Sarkar, Vivek; Zhao, Jisheng (2009-12-14)
      Modern compilation systems face the challenge of incrementally reanalyzing a program’s intermediate representation each time a code transformation is performed. Current approaches typically either re-analyze the entire ...
    • A Linear Transform Scheme for Combining Weights into Scores 

      Sung, Sam (1998-10-09)
      Ranking has been widely used in many applications. A ranking scheme usually employs a "scoring rule" that assigns a final numerical value to each and every object to be ranked. A scoring rule normally involves the use of ...
    • A MAC protocol for Multi Frequency Physical Layer 

      Kumar, Rajnish; PalChaudhuri, Santashil; Saha, Amit (2003-01-23)
      Existing MAC protocols for wireless LAN systems assume that a particular node can operate on only one frequency and that most/all of the nodes operate on the same frequency. We propose a MAC protocol for use in an ad hoc ...
    • A maximum pseudo-likelihood approach for phylogenetic networks 

      Yu, Yun; Nakhleh, Luay (2015)
      Abstract Background Several phylogenomic analyses have recently demonstrated the need to account simultaneously for incomplete lineage sorting (ILS) and hybridization when ...
    • A New Approach to Routing With Dynamic Metrics 

      Chen, Johnny; Druschel, Peter; Subramanian, Devika (1998-11-18)
      We present a new routing algorithm to compute paths within a network using dynamic link metrics. Dynamic link metrics are cost metrics that depend on a link's dynamic characteristics, e.g., the congestion on the link. Our ...
    • A Practical Soft Type System for Scheme 

      Cartwright, Robert; Wright, Andrew (1993-12-06)
      Soft type systems provide the benefits of static type checking for dynamically typed languages without rejecting untypable programs. A soft type checker infers types for variables and expressions and inserts explicit ...
    • A Related-Key Cryptanalysis of RC4 

      Grosul, Alexander; Wallach, Dan S. (2000-06-08)
      In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related keys, differing in one of the byte positions. The keystreams generated by RC4 for a key and ...
    • A Resource Management Framework for Predictable Quality of Service in Web Servers 

      Aron, Mohit; Druschel, Peter; Iyer, Sitaram (2003-07-07)
      This paper presents a resource management framework for providing predictable quality of service (QoS) in Web servers. The framework allows Web server and proxy operators to ensure a probabilistic minimal QoS level, expressed ...
    • A Sample-Driven Call Stack Profiler 

      Fowler, Rob; Froyd, Nathan; Mellor-Crummey, John (2004-07-15)
      Call graph profiling reports measurements of resource utilization along with information about the calling context in which the resources were consumed. We present the design of a novel profiler that measures resource ...
    • A Security Analysis of My.MP3.com and the Beam-it Protocol 

      Stubblefield, Adam; Wallach, Dan S. (2000-03-08)
      My.MP3.com is a service that streams audio in the MP3 format to its users. In order to resolve copyright concerns, the service first requires that a user prove he or she owns the right to listen to a particular CD. The ...
    • A Set of Convolution Identities Relating the Blocks of Two Dixon Resultant Matrices 

      Chionh, Eng-Wee; Goldman, Ronald; Zhang, Ming (1999-06-16)
      Resultants for bivariate polynomials are often represented by the determinants of very big matrices. Properly grouping the entries of these matrices into blocks is a very effective tool for studying the properties of these ...
    • A Simple and Effective Caching Scheme for Dynamic Content 

      Cox, Alan; Rajamani, Karthick (2000-11-28)
      As web sites increasingly deliver dynamic content, the process of content generation at request time is becoming a severe limitation to web site throughput. Recent studies have shown that much of the dynamic content is, ...
    • A simple, fast dominance algorithm 

      Cooper, Keith D.; Harvey, Timothy J.; Kennedy, Ken (2006-01-11)
      The problem of finding the dominators in a control-flow graph has a long history in the literature. The original algorithms suffered from a large asymptotic complexity but were easy to understand. Subsequent work improved ...
    • A Simple, Practical Distributed Multi-Path Routing Algorithm 

      Chen, Johnny; Druschel, Peter; Subramanian, Devika (1998-07-16)
      We present a simple and practical distributed routing algorithm based on backward learning. The algorithm periodically floods \emscout packets that explore paths to a destination in reverse. Scout packets are small and of ...
    • A Timing Channel Spyware Robust to MAC Random Back-off 

      Alkabani, Yousra; Coleman, Todd; Kiyavash, Negar; Koushanfar, Farinaz (2010-03-02)
      This paper presents the design and implementation of spyware communication circuits built into the widely used Carrier Sense Multiple Access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded ...
    • A Unified Framework for Multimodal IC Trojan Detection 

      Alkabani, Yousra; Koushanfar, Farinaz; Mirhoseini, Azalia (2010-02-02)
      This paper presents a unified formal framework for integrated circuits (IC) Trojan detection that can simultaneously employ multiple noninvasive measurement types. Hardware Trojans refer to modifications, alterations, or ...