Sciweavers

4139 search results - page 753 / 828
» Designing and Implementing Combinator Languages
Sort
View
EUROSYS
2009
ACM
15 years 8 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
EUROSYS
2006
ACM
15 years 8 months ago
Tashkent: uniting durability with transaction ordering for high-performance scalable database replication
In stand-alone databases, the two functions of ordering the transaction commits and making the effects of transactions durable are generally performed in one action, namely in the...
Sameh Elnikety, Steven G. Dropsho, Fernando Pedone
86
Voted
MOBICOM
2004
ACM
15 years 4 months ago
Routing in multi-radio, multi-hop wireless mesh networks
We present a new protocol for routing in multi-radio, multi-hop wireless networks. Our protocol, Multi-Radio Link-Quality Source Routing, is designed for wireless networks with st...
Richard Draves, Jitendra Padhye, Brian Zill
IEEEPACT
1998
IEEE
15 years 3 months ago
Static Methods in Hybrid Branch Prediction
Hybrid branch predictors combine the predictions of multiple single-level or two-level branch predictors. The prediction-combining hardware -- the "meta-predictor" -may ...
Dirk Grunwald, Donald C. Lindsay, Benjamin G. Zorn
CAV
2006
Springer
95views Hardware» more  CAV 2006»
15 years 2 months ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik