Sciweavers

276 search results - page 44 / 56
» Automatic Generation of Functional Programs from CASL Specif...
Sort
View
SOSP
2007
ACM
15 years 6 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
15 years 2 months ago
Knowledge Map Creation and Maintenance for Virtual Communities of Practice
This paper proposes a knowledge map management system to facilitate knowledge management in virtual communities of practice. To realize the proposed knowledge map management, we d...
Fu-ren Lin, Chih-ming Hsueh
78
Voted
COMPSAC
1998
IEEE
15 years 1 months ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi
OSDI
1994
ACM
14 years 11 months ago
Distributed Filaments: Efficient Fine-Grain Parallelism on a Cluster of Workstations
A fine-grain parallel program is one in which processes are typically small, ranging from a few to a few hundred instructions. Fine-grain parallelism arises naturally in many situ...
Vincent W. Freeh, David K. Lowenthal, Gregory R. A...
VLDB
2007
ACM
118views Database» more  VLDB 2007»
15 years 9 months ago
Eliminating Impedance Mismatch in C++
Recently, the C# and the VISUAL BASIC communities were tantalized by the advent of LINQ [18]--the Language INtegrated Query technology from Microsoft. LINQ represents a set of lan...
Joseph Gil, Keren Lenz