Sciweavers

4979 search results - page 913 / 996
» Batch codes and their applications
Sort
View
87
Voted
EUROSYS
2009
ACM
15 years 7 months ago
Isolating web programs in modern browser architectures
Many of today’s web sites contain substantial amounts of client-side code, and consequently, they act more like programs than simple documents. This creates robustness and perfo...
Charles Reis, Steven D. Gribble
82
Voted
SOSP
2007
ACM
15 years 7 months ago
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
Software defects significantly reduce system dependability. Among various types of software bugs, semantic and concurrency bugs are two of the most difficult to detect. This pape...
Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weiha...

Source Code
579views
15 years 6 months ago
The CImg Library
The CImg Library is an open source, C++ toolkit for image processing, designed with these properties in mind : Usefulness CImg defines classes and methods to manage images in y...
David Tschumperlé
89
Voted
CGO
2010
IEEE
15 years 5 months ago
Automated just-in-time compiler tuning
Managed runtime systems, such as a Java virtual machine (JVM), are complex pieces of software with many interacting components. The Just-In-Time (JIT) compiler is at the core of t...
Kenneth Hoste, Andy Georges, Lieven Eeckhout
ACSAC
2009
IEEE
15 years 5 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...