Sciweavers

645 search results - page 127 / 129
» A survey of software project managers on software process ch...
Sort
View
90
Voted
CGO
2004
IEEE
15 years 1 months ago
Exposing Memory Access Regularities Using Object-Relative Memory Profiling
Memory profiling is the process of characterizing a program's memory behavior by observing and recording its response to specific input sets. Relevant aspects of the program&...
Qiang Wu, Artem Pyatakov, Alexey Spiridonov, Easwa...
88
Voted
HIPC
2003
Springer
15 years 2 months ago
GridOS: Operating System Services for Grid Architectures
Abstract— In this work, we demonstrate the power of providing a common set of operating system services to Grid Architectures, including high-performance I/O, communication, reso...
Pradeep Padala, Joseph N. Wilson
SACMAT
2010
ACM
15 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ANLP
2000
149views more  ANLP 2000»
14 years 11 months ago
Javox: A Toolkit for Building Speech-Enabled Applications
JAVOX provides a mechanism for the development of spoken-language systems from existing desktop applications. We present an architecture that allows existing Java1 programs to be ...
Michael S. Fulkerson, Alan W. Biermann
KDD
2012
ACM
242views Data Mining» more  KDD 2012»
13 years 2 days ago
Query-driven discovery of semantically similar substructures in heterogeneous networks
Heterogeneous information networks that contain multiple types of objects and links are ubiquitous in the real world, such as bibliographic networks, cyber-physical networks, and ...
Xiao Yu, Yizhou Sun, Peixiang Zhao, Jiawei Han