Author image not provided
 Manfred Ruschitzka

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article8.57
Citation Count120
Publication count14
Publication years1977-1997
Available for download7
Average downloads per article311.29
Downloads (cumulative)2,179
Downloads (12 Months)37
Downloads (6 Weeks)5
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


14 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 14 of 14
Sort by:

1
May 1997 SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 59

Abstract: We describe a specification-based approach to detect exploitations of vulnerabilities in security-critical programs. The approach utilizes security specifications that describe the intended behavior of programs and scans audit trails for operations that are in violation of the specifications. We developed a formal framework for specifying the security-relevant behavior of ...
Keywords: formal framework, real-time intrusion detection system, system monitoring, Unix setuid root programs, program vulnerabilities, synchronization, audit trails, distributed systems, security specifications, security violations, security-critical program execution monitoring, specification-based approach, system attack detection

2
October 1996 Performance Evaluation: Volume 26 Issue 4, Oct. 1996
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Keywords: VMIN strategy, cache memories, locality-set sequences, memory management models, performance measures, reference behavior, realizable optimal policies, prepaging

3
February 1993 IEEE Transactions on Computers: Volume 42 Issue 2, February 1993
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 6

A memory-management model based on describing reference behavior in terms of locality-set sequences is proposed. Specialized for fixed-size buffers, this model is used to define the PSETMIN and SETMIN strategies which are proven to minimize the number of page faults in the presence and absence of prepaging, respectively. In contrast ...
Keywords: fixed-size buffers, multiattribute-index catalogs, relational database management systems, SETMIN strategies, concomitant performance gains, prepaging, heuristics, memory-management model, page faults, storage management., MIN, PSETMIN, locality-set sequences, optimal locality-set management, reference behavior, relational databases

4
January 1990 Future Generation Computer Systems - Improving perfomance in multiprocessors and networks: Volume 5 Issue 4, Jan. 1990
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2


5
October 1989 IEEE Transactions on Software Engineering: Volume 15 Issue 10, October 1989
Publisher: IEEE Press
Bibliometrics:
Citation Count: 2

First Page of the Article
Keywords: design Methodology, heterogenous computer systems, environment grammars, parsing, relational database management systems, syntax-driven data translation, proprietary data formats

6 published by ACM
July 1984 AFIPS '84: Proceedings of the July 9-12, 1984, national computer conference and exposition
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 29

Full text available: PDFPDF
The proliferation of inexpensive microprocessor systems and communications equipment has provided the general public with the ability to access remote database systems. It also makes off-loading of some of the query-processing load of such remote systems to microprocessor systems an attractive possibility, but problems concerning data portability and adequate software ...

7 published by ACM
May 1984 ACM Transactions on Computer Systems (TOCS): Volume 2 Issue 2, May 1984
Publisher: ACM
Bibliometrics:
Citation Count: 37
Downloads (6 Weeks): 3,   Downloads (12 Months): 16,   Downloads (Overall): 838

Full text available: PDFPDF
Keywords: error recovery, database recovery, equicost checkpointing strategy, equidistant checkpointing strategy, performance modeling and optimization, rollback recovery, system availability

8 published by ACM
August 1983 SIGMETRICS '83: Proceedings of the 1983 ACM SIGMETRICS conference on Measurement and modeling of computer systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 155

Full text available: PDFPDF
A widely used error recovery technique in database systems is the rollback and recovery technique. This technique saves periodically the state of the system and records all activities on a reliable log tape. The operation of saving the system state is called checkpointing. The elapsed time between two consecutive checkpointing ...

9 published by ACM
April 1982 Journal of the ACM (JACM): Volume 29 Issue 2, April 1982
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 247

Full text available: PDFPDF

10 published by ACM
May 1980 ACM SIGMETRICS Performance Evaluation Review: Volume 9 Issue 2, Summer 1980
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 3,   Downloads (Overall): 69

Full text available: PdfPdf
Policy function schedulers provide a flexible framework for implementing a wide range of different scheduling schemes. In such schedulers, the priority of a job at any instant in time is defined by the difference between the time it spent in the system and an arbitrary function of its attained service ...
Also published in:
May 1980  PERFORMANCE '80: Proceedings of the 1980 international symposium on Computer performance modelling, measurement and evaluation

11
February 1979 Proceedings of the Third International Symposium on Modelling and Performance Evaluation of Computer Systems: Performance of Computer Systems
Publisher: North-Holland Publishing Co.
Bibliometrics:
Citation Count: 0


12
October 1978 Operations Research: Volume 26 Issue 5, October 1978
Publisher: INFORMS
Bibliometrics:
Citation Count: 0

This paper presents an analysis of time-sharing computer facilities using scheduling algorithms defined in terms of priority functions. We consider the class of algorithms in which a job's priority is defined by the difference between the time it spent in the system and an arbitrary function F of its attained ...

13 published by ACM
July 1977 Communications of the ACM: Volume 20 Issue 7, July 1977
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 379

Full text available: PDFPDF
This paper presents a scheme for classifying scheduling algorithms based on an abstract model of a scheduling system which formalizes the notion of priority. Various classes of scheduling algorithms are defined and related to existing algorithms. A criterion for the implementation efficiency of an algorithm is developed and results in ...
Keywords: implementation efficiency, priority, scheduling models, operating systems, processor sharing, scheduling algorithms

14 published by ACM
February 1977 ACM SIGCSE Bulletin - Special issue seventh technical symposium on computer science education: Volume 9 Issue 1, Feb 1977
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 462

Full text available: PDFPDF
While the adoption of an implementation project for an operating systems course is certainly beneficial, non-trivial projects are inherently demanding in terms of student efforts and computer costs. This paper reports on a project which has been designed to keep the effort for an extensive simulation of a contemporary system ...
Also published in:
February 1977  SIGCSE '77: Proceedings of the seventh SIGCSE technical symposium on Computer science education



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us