منابع مشابه
Browser Fingerprinting : Analysis , Detection , and Prevention at Runtime
Most Web users are unaware of being identified or followed by web agents which leverage techniques such as browser fingerprinting (or fingerprinting). Data obtained through such fingerprinting techniques can be utilized for various purposes ranging from understanding the types and properties of the user’s browser to learning the user Web experience (e.g., through the browsing history). For ente...
متن کاملGrappa: A Latency-Tolerant Runtime for Large-Scale Irregular Applications
Grappa is a runtime system for commodity clusters of multicore computers that presents a massively parallel, single address space abstraction to applications. Grappa’s purpose is to enable scalable performance of irregular parallel applications, such as branch and bound optimization, SPICE circuit simulation, and graph processing. Poor data locality, imbalanced parallel work and complex communi...
متن کاملFRAPpuccino: Fault-detection through Runtime Analysis of Provenance
We present FRAPpuccino (or FRAP), a provenancebased fault detection mechanism for Platform as a Service (PaaS) users, who run many instances of an application on a large cluster of machines. FRAP models, records, and analyzes the behavior of an application and its impact on the system as a directed acyclic provenance graph. It assumes that most instances behave normally and uses their behavior ...
متن کاملresponse articles: micro and macro analysis
the present study reports an analysis of response articles in four different disciplines in the social sciences, i.e., linguistics, english for specific purposes (esp), accounting, and psychology. the study has three phases: micro analysis, macro analysis, and e-mail interview. the results of the micro analysis indicate that a three-level linguistic pattern is used by the writers in order to cr...
15 صفحه اولMemory usage improvement using runtime alias detection
Tofte and Talpin proposed a novel method for memory management called region inference in typed, higher-order languages[7]. In their method, memory is composed of blocks called regions, and when to allocate and deallocate regions are determined automatically by the compiler using a type system, and source programs are translated into target programs with region annotations. Their method realize...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Software: Practice and Experience
سال: 2016
ISSN: 0038-0644
DOI: 10.1002/spe.2389