-
1
-
-
84870704453
-
-
Adobe flash player. http://www.adobe.com/software/flash/about.
-
Adobe Flash Player
-
-
-
3
-
-
85080362863
-
-
Box Sync ruins my rMBP. https://support.box.com/entries/21766312-Box-Syncruins-my-rMBP.
-
Box Sync Ruins My RMBP
-
-
-
4
-
-
85080345476
-
-
cgroups. http://www.kernel.org/doc/Documentation/cgroups/cgroups.txt.
-
Cgroups
-
-
-
9
-
-
84872834446
-
-
Folding@Home. http://folding.stanford.edu/.
-
Folding@Home
-
-
-
11
-
-
85080416273
-
-
ionice. http://linux.die.net/man/1/ionice.
-
Ionice
-
-
-
12
-
-
84941150921
-
-
Java Virtual Machine. http://docs.oracle.com/javase/specs/jvms/se7/html/index.html.
-
Java Virtual Machine
-
-
-
15
-
-
85080350906
-
-
nice. http://www.kernel.org/doc/manpages/online/pages/man2/nice.2.html.
-
Nice
-
-
-
16
-
-
85080333213
-
-
Open3GMap. https://o3gm.cs.univie.ac.at/.
-
Open3GMap
-
-
-
19
-
-
84869676691
-
-
Richards benchmark. http://www.cl.cam.ac.uk/~mr10/Bench.html.
-
Richards Benchmark
-
-
-
20
-
-
85080422026
-
-
Scan causes CPU to overheat. https://community.norton.com/t5/Norton-Internet-Security-Norton/Scancauses-CPU-to-overheat/tdp/642743.
-
Scan Causes CPU to Overheat
-
-
-
23
-
-
84885579967
-
-
SETI@Home. http://setiathome.berkeley.edu/.
-
SETI@Home
-
-
-
24
-
-
85080464033
-
-
Sintel trailer. http://www.sintel.org/download.
-
Sintel Trailer
-
-
-
25
-
-
85080427045
-
-
ulimit. http://linux.die.net/man/1/ulimit.
-
Ulimit
-
-
-
26
-
-
84872740465
-
-
VirtualBox. https://www.virtualbox.org/wiki.
-
VirtualBox
-
-
-
29
-
-
84863154916
-
-
Windows Virtual PC. http://support.microsoft.com/kb/958559.
-
Windows Virtual PC
-
-
-
31
-
-
0032293318
-
Integrating multimedia applications in hard real-time systems
-
L. Abeni, G. Buttazzo, S. Superiore, and S. Anna. Integrating multimedia applications in hard real-time systems. In In Proceedings of the 19th IEEE Realtime Systems Symposium, pages 4-13, 1998.
-
(1998)
Proceedings of the 19th IEEE Realtime Systems Symposium
, pp. 4-13
-
-
Abeni, L.1
Buttazzo, G.2
Superiore, S.3
Anna, S.4
-
33
-
-
80051911893
-
-
A. AuYoung, B. Chun, C. Ng, D. Parkes, J. Shneidman, A. Snoeren, and A. Vahdat. Bellagio: An economic-based resource allocation system for planetlab. http://www.sysnet.ucsd.edu/ãauyoung/bellagio/about.php.
-
Bellagio: An Economic-based Resource Allocation System for Planetlab
-
-
AuYoung, A.1
Chun, B.2
Ng, C.3
Parkes, D.4
Shneidman, J.5
Snoeren, A.6
Vahdat, A.7
-
36
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In the nineteenth ACM symposium on Operating systems principles, 2003.
-
(2003)
The Nineteenth ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
37
-
-
0017492183
-
Pulse-frequency modulation applied to the digital control of a thyristor
-
May
-
M. Broughton. Pulse-frequency modulation applied to the digital control of a thyristor. IEEE Trans. Industrial Electronics and Control Instrumentation, 24(2):173-177, May 1977.
-
(1977)
IEEE Trans. Industrial Electronics and Control Instrumentation
, vol.24
, Issue.2
, pp. 173-177
-
-
Broughton, M.1
-
38
-
-
85077019413
-
Dynamic instrumentation of production systems
-
B. M. Cantrill, M. W. Shapiro, and A. H. Leventhal. Dynamic instrumentation of production systems. In Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC '04, pages 2-2, 2004.
-
(2004)
Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC '04
, pp. 2
-
-
Cantrill, B.M.1
Shapiro, M.W.2
Leventhal, A.H.3
-
40
-
-
78649981256
-
Retaining sandbox containment despite bugs in privileged memory-safe code
-
J. Cappos, A. Dadgar, J. Rasley, J. Samuel, I. Beschastnikh, C. Barsan, A. Krishnamurthy, and T. Anderson. Retaining sandbox containment despite bugs in privileged memory-safe code. In the 17th ACM conference on Computer and communications security, 2010.
-
(2010)
The 17th ACM Conference on Computer and Communications Security
-
-
Cappos, J.1
Dadgar, A.2
Rasley, J.3
Samuel, J.4
Beschastnikh, I.5
Barsan, C.6
Krishnamurthy, A.7
Anderson, T.8
-
42
-
-
34548137300
-
On the minimization fo the instantaneous temperature for periodic realtime tasks
-
IEEE
-
J. Chen, C. Hung, and T. Kuo. On the minimization fo the instantaneous temperature for periodic realtime tasks. In Real Time and Embedded Technology and Applications Symposium, 2007. RTAS'07. 13th IEEE, pages 236-248. IEEE, 2007.
-
(2007)
Real Time and Embedded Technology and Applications Symposium, 2007. RTAS'07. 13th IEEE
, pp. 236-248
-
-
Chen, J.1
Hung, C.2
Kuo, T.3
-
43
-
-
36949000833
-
Thermal-aware task scheduling at the system software level
-
ACM
-
J. Choi, C. Cher, H. Franke, H. Hamann, A. Weger, and P. Bose. Thermal-aware task scheduling at the system software level. In Proceedings of the 2007 international symposium on Low power electronics and design, pages 213-218. ACM, 2007.
-
(2007)
Proceedings of the 2007 International Symposium on Low Power Electronics and Design
, pp. 213-218
-
-
Choi, J.1
Cher, C.2
Franke, H.3
Hamann, H.4
Weger, A.5
Bose, P.6
-
44
-
-
84856411518
-
Et (smart) phone home!
-
New York, NY, USA, ACM
-
L. Collares, C. Matthews, J. Cappos, Y. Coady, and R. McGeer. Et (smart) phone home! In Proceedings of the compilation of the co-located workshops on DSM'11, TMC'11, AGERE!'11, AOOPES'11, NEAT'11, VMIL'11, SPLASH '11 Workshops, pages 283-288, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Compilation of the Co-located Workshops on DSM'11, TMC'11, AGERE!'11, AOOPES'11, NEAT'11, VMIL'11, SPLASH '11 Workshops
, pp. 283-288
-
-
Collares, L.1
Matthews, C.2
Cappos, J.3
Coady, Y.4
McGeer, R.5
-
45
-
-
77952254521
-
I/O resource management through system call scheduling
-
S. S. Craciunas, C. M. Kirsch, and H. Rock. I/O resource management through system call scheduling. ACM SIGOPS Operating Systems Review, 42(5):44-54, 2008.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.5
, pp. 44-54
-
-
Craciunas, S.S.1
Kirsch, C.M.2
Rock, H.3
-
46
-
-
84886596405
-
Service architectures for the future converged internet: Specific challenges and possible solutions for mobile broad-band traffic management
-
J. Eisl, A. Rafetseder, and K. Tutschku. Service architectures for the future converged internet: Specific challenges and possible solutions for mobile broad-band traffic management. Future Internet Services and Service Architectures, 15:49, 2011.
-
(2011)
Future Internet Services and Service Architectures
, vol.15
, pp. 49
-
-
Eisl, J.1
Rafetseder, A.2
Tutschku, K.3
-
47
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
H. Feng, J. Giffin, Y. Huang, S. Jha, W. Lee, and B. Miller. Formalizing sensitivity in static analysis for intrusion detection. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, pages 194-208, 2004.
-
(2004)
Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on
, pp. 194-208
-
-
Feng, H.1
Giffin, J.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.6
-
50
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff. A sense of self for unix processes. In Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, pages 120-128, 1996.
-
(1996)
Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
51
-
-
21644483415
-
Sharp: An architecture for secure resource peering
-
Y. Fu, J. Chase, B. Chun, S. Schwab, and A. Vahdat. Sharp: An architecture for secure resource peering. In Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP '03, 2003.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03
-
-
Fu, Y.1
Chase, J.2
Chun, B.3
Schwab, S.4
Vahdat, A.5
-
52
-
-
33645980138
-
Ostia: A delegating architecture for secure system call interposition
-
T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In IN NDSS, 2003.
-
(2003)
In NDSS
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
53
-
-
85084162735
-
A secure environment for untrusted helper applications confining the wily hacker
-
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications confining the wily hacker. In Proceedings of the 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography-Volume 6, SSYM'96, 1996.
-
(1996)
Proceedings of the 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography-Volume 6, SSYM'96
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
54
-
-
28444441586
-
Heat stroke: Power-density-based denial of service in SMT
-
Washington, DC, USA, IEEE Computer Society
-
J. Hasan, A. Jalote, T. N. Vijaykumar, and C. E. Brodley. Heat stroke: Power-density-based denial of service in SMT. In Proceedings of the 11th International Symposium on High-Performance Computer Architecture, HPCA '05, pages 166-177, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the 11th International Symposium on High-Performance Computer Architecture, HPCA '05
, pp. 166-177
-
-
Hasan, J.1
Jalote, A.2
Vijaykumar, T.N.3
Brodley, C.E.4
-
55
-
-
84884999344
-
Applicationsensitive access control evaluation using parameterized expressiveness
-
T. L. Hinrichs, D. Martinoia, W. C. Garrison III, A. J. Lee, A. Panebianco, and L. Zuck. Applicationsensitive access control evaluation using parameterized expressiveness. In Computer Security Foundations Symposium, 2013. 26th IEEE, 2013.
-
(2013)
Computer Security Foundations Symposium, 2013. 26th IEEE
-
-
Hinrichs, T.L.1
Martinoia, D.2
Garrison, I.I.I.W.C.G.3
Lee, A.J.4
Panebianco, A.5
Zuck, L.6
-
57
-
-
84860593849
-
Sharing networked resources with brokered leases
-
D. Irwin, J. Chase, L. Grit, A. Yumerefendi, D. Becker, and K. G. Yocum. Sharing networked resources with brokered leases. In Proceedings of the annual conference on USENIX '06 Annual Technical Conference, ATEC '06, 2006.
-
(2006)
Proceedings of the Annual Conference on USENIX '06 Annual Technical Conference, ATEC '06
-
-
Irwin, D.1
Chase, J.2
Grit, L.3
Yumerefendi, A.4
Becker, D.5
Yocum, K.G.6
-
59
-
-
85077749236
-
Analyzing integrity protection in the selinux example policy
-
Berkeley, CA, USA, USENIX Association
-
T. Jaeger, R. Sailer, and X. Zhang. Analyzing integrity protection in the selinux example policy. In Proceedings of the 12th Conference on USENIX Security Symposium-Volume 12, SSYM'03, pages 5-5, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium-Volume 12, SSYM'03
, pp. 5
-
-
Jaeger, T.1
Sailer, R.2
Zhang, X.3
-
61
-
-
34547143358
-
Hybdtm: A coordinated hardware-software approach for dynamic thermal management
-
ACM
-
A. Kumar, L. Shang, L. Peh, and N. Jha. Hybdtm: A coordinated hardware-software approach for dynamic thermal management. In Proceedings of the 43rd annual Design Automation Conference, pages 548-553. ACM, 2006.
-
(2006)
Proceedings of the 43rd Annual Design Automation Conference
, pp. 548-553
-
-
Kumar, A.1
Shang, L.2
Peh, L.3
Jha, N.4
-
62
-
-
85006150724
-
Tycoon: An implementation of a distributed, market-based resource allocation system
-
Aug
-
K. Lai, L. Rasmusson, E. Adar, L. Zhang, and B. A. Huberman. Tycoon: An implementation of a distributed, market-based resource allocation system. Multiagent Grid Syst., 1(3), Aug. 2005.
-
(2005)
Multiagent Grid Syst
, vol.1
, Issue.3
-
-
Lai, K.1
Rasmusson, L.2
Adar, E.3
Zhang, L.4
Huberman, B.A.5
-
63
-
-
0024138827
-
Condor-a hunter of idle workstations
-
M. Litzkow, M. Livny, and M. Mutka. Condor-a hunter of idle workstations. In Distributed Computing Systems, 1988., 8th International Conference on, pages 104-111, 1988.
-
(1988)
Distributed Computing Systems, 1988., 8th International Conference on
, pp. 104-111
-
-
Litzkow, M.1
Livny, M.2
Mutka, M.3
-
64
-
-
84872104986
-
Enabling trusted scheduling in embedded systems
-
New York, NY, USA, ACM
-
R. J. Masti, C. Marforio, A. Ranganathan, A. Francillon, and S. Capkun. Enabling trusted scheduling in embedded systems. In Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12, pages 61-70, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12
, pp. 61-70
-
-
Masti, R.J.1
Marforio, C.2
Ranganathan, A.3
Francillon, A.4
Capkun, S.5
-
65
-
-
85080459706
-
Lind: Challenges turning virtual composition into reality
-
C. Matthews, J. Cappos, R. McGeer, S. Neville, and Y. Coady. Lind: Challenges turning virtual composition into reality. In Freeco 2011 Onward! Workshop: Towards Free Composition of Software Modules, 2011.
-
(2011)
Freeco 2011 Onward! Workshop: Towards Free Composition of Software Modules
-
-
Matthews, C.1
Cappos, J.2
McGeer, R.3
Neville, S.4
Coady, Y.5
-
66
-
-
77952180121
-
Task activity vectors: A new metric for temperature-aware scheduling
-
A. Merkel and F. Bellosa. Task activity vectors: A new metric for temperature-aware scheduling. ACM SIGOPS Operating Systems Review, 42(4):1-12, 2008.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.4
, pp. 1-12
-
-
Merkel, A.1
Bellosa, F.2
-
70
-
-
84860294696
-
Accessory: Password inference using accelerometers on smartphones
-
New York, NY, USA, ACM
-
E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. Accessory: Password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems &38; Applications, HotMobile '12, pages 91-96, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Twelfth Workshop on Mobile Computing Systems &38; Applications, HotMobile '12
, pp. 91-96
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
71
-
-
84860588880
-
Where is the energy spent inside my app?: Fine grained energy accounting on smartphones with eprof
-
New York, NY, USA, ACM
-
A. Pathak, Y. C. Hu, and M. Zhang. Where is the energy spent inside my app?: Fine grained energy accounting on smartphones with eprof. In Proceedings of the 7th ACM european conference on Computer Systems, EuroSys '12, pages 29-42, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 7th ACM European Conference on Computer Systems, EuroSys '12
, pp. 29-42
-
-
Pathak, A.1
Hu, Y.C.2
Zhang, M.3
-
72
-
-
85006277702
-
Experiences building planetlab
-
L. Peterson, A. Bavier, M. E. Fiuczynski, and S. Muir. Experiences building planetlab. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06, pages 351-366, 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06
, pp. 351-366
-
-
Peterson, L.1
Bavier, A.2
Fiuczynski, M.E.3
Muir, S.4
-
73
-
-
84898070904
-
Exploring youtube's content distribution network through distributed application-layer measurements: A first view
-
ITCP
-
A. Rafetseder, F. Metzger, D. Stezenbach, and K. Tutschku. Exploring youtube's content distribution network through distributed application-layer measurements: A first view. In Proceedings of the 2011 International Workshop on Modeling, Analysis, and Control of Complex Networks, Cnet '11, pages 31-36. ITCP, 2011.
-
(2011)
Proceedings of the 2011 International Workshop on Modeling, Analysis, and Control of Complex Networks, Cnet '11
, pp. 31-36
-
-
Rafetseder, A.1
Metzger, F.2
Stezenbach, D.3
Tutschku, K.4
-
74
-
-
0032387903
-
Resource kernels: A resource-centric approach to real-time and multimedia systems
-
R. Rajkumar, K. Juvva, A. Molano, and S. Oikawa. Resource kernels: A resource-centric approach to real-time and multimedia systems. In In Proceedings of the SPIE/ACM Conference on Multimedia Computing and Networking, pages 150-164, 1998.
-
(1998)
Proceedings of the SPIE/ACM Conference on Multimedia Computing and Networking
, pp. 150-164
-
-
Rajkumar, R.1
Juvva, K.2
Molano, A.3
Oikawa, S.4
-
75
-
-
79955965588
-
Energy management in mobile devices with the cinder operating system
-
A. Roy, S. M. Rumble, R. Stutsman, P. Levis, D. Mazières, and N. Zeldovich. Energy management in mobile devices with the cinder operating system. In EuroSys 2011, 2011.
-
(2011)
EuroSys 2011
-
-
Roy, A.1
Rumble, S.M.2
Stutsman, R.3
Levis, P.4
Mazières, D.5
Zeldovich, N.6
-
76
-
-
0028387091
-
An introduction to disk drive modeling
-
C. Ruemmler and J. Wilkes. An introduction to disk drive modeling. Computer Volume 27 Issue 3, 1994.
-
(1994)
Computer
, vol.27
, Issue.3
-
-
Ruemmler, C.1
Wilkes, J.2
-
77
-
-
74049153249
-
Application containers without virtual machines
-
New York, NY, USA, ACM
-
M. Sherr and M. Blaze. Application containers without virtual machines. In Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec '09, pages 39-42, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec '09
, pp. 39-42
-
-
Sherr, M.1
Blaze, M.2
-
79
-
-
85076163562
-
-
Technical report, Old Dominion University, Norfolk, VA, USA
-
I. Stoica, H. Abdel-Wahab, and K. Jeffay. On the duality between resource reservation and proportional share resource allocation. Technical report, Old Dominion University, Norfolk, VA, USA, 1996.
-
(1996)
On the Duality between Resource Reservation and Proportional Share Resource Allocation
-
-
Stoica, I.1
Abdel-Wahab, H.2
Jeffay, K.3
-
80
-
-
0004193866
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA, 2nd edition
-
A. S. Tanenbaum. Modern Operating Systems. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2nd edition, 2001.
-
(2001)
Modern Operating Systems
-
-
Tanenbaum, A.S.1
-
81
-
-
78650567323
-
Towards sustained multi media experience in the future mobile internet
-
IEEE
-
K. Tutschku, A. Rafetseder, J. Eisl, and W. Wiedermann. Towards sustained multi media experience in the future mobile internet. In Intelligence in Next Generation Networks (ICIN), 2010 14th International Conference on, pages 1-6. IEEE, 2010.
-
(2010)
Intelligence in Next Generation Networks (ICIN), 2010 14th International Conference on
, pp. 1-6
-
-
Tutschku, K.1
Rafetseder, A.2
Eisl, J.3
Wiedermann, W.4
-
82
-
-
62149087382
-
Resource overbooking and application profiling in a shared internet hosting platform
-
Feb
-
B. Urgaonkar, P. Shenoy, and T. Roscoe. Resource overbooking and application profiling in a shared internet hosting platform. ACM Trans. Internet Technol., 9(1), Feb. 2009.
-
(2009)
ACM Trans. Internet Technol
, vol.9
, Issue.1
-
-
Urgaonkar, B.1
Shenoy, P.2
Roscoe, T.3
-
83
-
-
85076933343
-
-
Accessed April 14, 2012
-
Using SO REUSEADDR and SO EXCLUSIVEADDRUSE. Accessed April 14, 2012. http://msdn.microsoft.com/enus/library/ms740621%28VS.85%29.aspx.
-
Using so REUSEADDR and so EXCLUSIVEADDRUSE
-
-
-
84
-
-
77955391089
-
Deep: A deployable energy efficient 802.15.4 mac protocol for sensor networks
-
M. Valero, A. Bourgeois, and R. Beyah. Deep: A deployable energy efficient 802.15.4 mac protocol for sensor networks. In Communications (ICC), 2010 IEEE International Conference on, pages 1-6, 2010.
-
(2010)
Communications (ICC), 2010 IEEE International Conference on
, pp. 1-6
-
-
Valero, M.1
Bourgeois, A.2
Beyah, R.3
-
85
-
-
79961065539
-
Erdos: Achieving energy savings in mobile os
-
New York, NY, USA, ACM
-
N. Vallina-Rodriguez and J. Crowcroft. Erdos: Achieving energy savings in mobile os. In Proceedings of the sixth international workshop on MobiArch, MobiArch '11, pages 37-42, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Sixth International Workshop on MobiArch, MobiArch '11
, pp. 37-42
-
-
Vallina-Rodriguez, N.1
Crowcroft, J.2
-
86
-
-
84877716990
-
Process firewalls: Protecting processes during resource access
-
New York, NY, USA, ACM
-
H. Vijayakumar, J. Schiffman, and T. Jaeger. Process firewalls: Protecting processes during resource access. In Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys '13, pages 57-70, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys '13
, pp. 57-70
-
-
Vijayakumar, H.1
Schiffman, J.2
Jaeger, T.3
-
87
-
-
52249084545
-
Dynamic thermal management through task scheduling
-
IEEE
-
J. Yang, X. Zhou, M. Chrobak, Y. Zhang, and L. Jin. Dynamic thermal management through task scheduling. In Performance Analysis of Systems and software, 2008. ISPASS 2008. IEEE International Symposium on, pages 191-201. IEEE, 2008.
-
(2008)
Performance Analysis of Systems and Software, 2008. ISPASS 2008. IEEE International Symposium on
, pp. 191-201
-
-
Yang, J.1
Zhou, X.2
Chrobak, M.3
Zhang, Y.4
Jin, L.5
|