Sciweavers

7530 search results - page 1348 / 1506
» Design and Implementation of the YAWL System
Sort
View
DILS
2006
Springer
15 years 1 months ago
Collection-Oriented Scientific Workflows for Integrating and Analyzing Biological Data
Steps in scientific workflows often generate collections of results, causing the data flowing through workflows to become increasingly nested. Because conventional workflow compone...
Timothy M. McPhillips, Shawn Bowers, Bertram Lud&a...
ESOP
2006
Springer
15 years 1 months ago
Haskell Is Not Not ML
We present a typed calculus IL ("intermediate language") which supports the embedding of ML-like (strict, eager) and Haskell-like (non-strict, lazy) languages, without fa...
Ben Rudiak-Gould, Alan Mycroft, Simon L. Peyton Jo...
63
Voted
EUC
2006
Springer
15 years 1 months ago
Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB
- Modern portable or embedded systems support more and more complex applications. These applications make embedded devices require not only low powerconsumption, but also high comp...
Wann-Yun Shieh, Hsin-Dar Chen
EUROPAR
2006
Springer
15 years 1 months ago
Toward a Definition of and Linguistic Support for Partial Quiescence
Abstract. The global quiescence of a distributed computation (or distributed termination detection) is an important problem. Some concurrent programming languages and systems provi...
Billy Yan-Kit Man, Hiu Ning (Angela) Chan, Andrew ...
82
Voted
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 1 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
« Prev « First page 1348 / 1506 Last » Next »