Sciweavers

1061 search results - page 134 / 213
» A general definition of malware
Sort
View
ICFP
2003
ACM
15 years 12 months ago
A sound and complete axiomatization of delimited continuations
The shift and reset operators, proposed by Danvy and Filinski, are powerful control primitives for capturing delimited continuations. Delimited continuation is a similar concept a...
Yukiyoshi Kameyama, Masahito Hasegawa
MOBIHOC
2007
ACM
15 years 11 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
POPL
2010
ACM
15 years 9 months ago
Integrating Typed and Untyped Code in a Scripting Language
Many large software systems originate from untyped scripting language code. While good for initial development, the lack of static type annotations can impact code-quality and per...
Francesco Zappa Nardelli, Jan Vitek, Johan Ös...
PPOPP
2010
ACM
15 years 9 months ago
Featherweight X10: a core calculus for async-finish parallelism
We present a core calculus with two of X10's key constructs for parallelism, namely async and finish. Our calculus forms a convenient basis for type systems and static analys...
Jonathan K. Lee, Jens Palsberg
CHI
2010
ACM
15 years 6 months ago
Toward an ecological sensibility: tools for evaluating sustainable HCI
We are developing evaluation tools that help sustainable HCI researchers to contribute to the overall project of achieving sustainability. In this paper we argue for broadening su...
M. Six Silberman, Bill Tomlinson