Sciweavers

13553 search results - page 2545 / 2711
» A Generalized Multi-View Approach
Sort
View
141
Voted
PLDI
2003
ACM
15 years 9 months ago
Points-to analysis using BDDs
This paper reports on a new approach to solving a subset-based points-to analysis for Java using Binary Decision Diagrams (BDDs). In the model checking community, BDDs have been s...
Marc Berndl, Ondrej Lhoták, Feng Qian, Laur...
165
Voted
PPOPP
2003
ACM
15 years 9 months ago
Using generative design patterns to generate parallel code for a distributed memory environment
A design pattern is a mechanism for encapsulating the knowledge of experienced designers into a re-usable artifact. Parallel design patterns reflect commonly occurring parallel co...
Kai Tan, Duane Szafron, Jonathan Schaeffer, John A...
143
Voted
SAC
2003
ACM
15 years 9 months ago
UbiData: Ubiquitous Mobile File Service
One of the most challenging objectives of mobile data management is the ubiquitous, any time, anywhere access. This objective is very difficult to meet due to several network and ...
Jinsuo Zhang, Abdelsalam Helal, Joachim Hammer
157
Voted
SACMAT
2003
ACM
15 years 9 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
144
Voted
SACMAT
2003
ACM
15 years 9 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
« Prev « First page 2545 / 2711 Last » Next »