Sciweavers

84 search results - page 14 / 17
» An Imperative Extension to Alloy
Sort
View
117
Voted
TCS
2008
15 years 10 days ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
SIGMETRICS
2005
ACM
105views Hardware» more  SIGMETRICS 2005»
15 years 6 months ago
An interposed 2-Level I/O scheduling framework for performance virtualization
I/O consolidation is a growing trend in production environments due to the increasing complexity in tuning and managing storage systems. A consequence of this trend is the need to...
Jianyong Zhang, Anand Sivasubramaniam, Alma Riska,...
121
Voted
EPIA
2003
Springer
15 years 5 months ago
jcc: Integrating Timed Default Concurrent Constraint Programming into Java
Abstract. This paper describes jcc, an integration of the timed default concurrent constraint programming framework [16] (Timed Default cc) into JAVA [7]. jcc is intended for use i...
Vijay A. Saraswat, Radha Jagadeesan, Vineet Gupta
119
Voted
GG
2008
Springer
15 years 1 months ago
Transformation-Based Operationalization of Graph Languages
Graph Languages1 emerged during the seventies from the necessity to process data structures with complex interrelations. Nowadays, various variants of these languages can be found...
Erhard Weinell
120
Voted
JSS
2006
111views more  JSS 2006»
15 years 11 days ago
Declarative programming of integrated peer-to-peer and Web based systems: the case of Prolog
Web and peer-to-peer systems have emerged as popular areas in distributed computing, and their integrated usage permits the benefits of both to be exploited. While much work in th...
Seng Wai Loke