Sciweavers

3168 search results - page 532 / 634
» Computing Event Dependencies in System Designs and Programs
Sort
View
TCS
2010
15 years 2 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
154
Voted
MOBIHOC
2008
ACM
16 years 4 months ago
Generic mobility simulation framework (GMSF)
Vehicular ad-hoc networks with inter-vehicular communications are a prospective technology which contributes to safer and more efficient roads and offers information and entertain...
Rainer Baumann, Franck Legendre, Philipp Sommer
CCS
2009
ACM
15 years 11 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
150
Voted
ICSE
2007
IEEE-ACM
16 years 4 months ago
Software Development Environments for Scientific and Engineering Software: A Series of Case Studies
The need for high performance computing applications for computational science and engineering projects is growing rapidly, yet there have been few detailed studies of the softwar...
Jeffrey C. Carver, Richard P. Kendall, Susan E. Sq...
ICCD
2005
IEEE
108views Hardware» more  ICCD 2005»
16 years 1 months ago
Methods for Modeling Resource Contention on Simultaneous Multithreading Processors
Simultaneous multithreading (SMT) seeks to improve the computation throughput of a processor core by sharing primary resources such as functional units, issue bandwidth, and cache...
Tipp Moseley, Dirk Grunwald, Joshua L. Kihm, Danie...