Sciweavers

1791 search results - page 214 / 359
» Behavioral Operations
Sort
View
158
Voted
PRDC
2002
IEEE
15 years 8 months ago
Caveat Emptor: Making Grid Services Dependable from the Client Side
Grid computing relies on fragile partnerships. Clients with hundreds or even thousands of pending service requests must seek out and form temporary alliances with remote servers e...
Miron Livny, Douglas Thain
USENIX
1990
15 years 5 months ago
swm: An X Window Manager Shell
swm is a policy-free, user configurable window manager client for the X Window System. Besides providing basic window manager functionality, swm introduces new features not found ...
Thomas E. LaStrange
CAV
1998
Springer
175views Hardware» more  CAV 1998»
15 years 8 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
USS
2010
15 years 1 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
PLDI
2010
ACM
15 years 9 months ago
Green: a framework for supporting energy-conscious programming using controlled approximation
Energy-efficient computing is important in several systems ranging from embedded devices to large scale data centers. Several application domains offer the opportunity to tradeof...
Woongki Baek, Trishul M. Chilimbi