Sciweavers

5790 search results - page 111 / 1158
» Distributed programming with distributed authorization
Sort
View
155
Voted
IPAW
2010
15 years 2 days ago
Data Provenance in Distributed Propagator Networks
Abstract. The heterogeneous and unreliable nature of distributed systems has created a distinct need for the inclusion of provenance within their design to allow for error correcti...
Ian Jacobi
OOPSLA
2004
Springer
15 years 7 months ago
The garbage collection advantage: improving program locality
As improvements in processor speed continue to outpace improvements in cache and memory speed, poor locality increasingly degrades performance. Because copying garbage collectors ...
Xianglong Huang, Stephen M. Blackburn, Kathryn S. ...
140
Voted
DAC
2003
ACM
16 years 3 months ago
Behavioral consistency of C and verilog programs using bounded model checking
We present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking. Both the circuit and the program ...
Edmund M. Clarke, Daniel Kroening, Karen Yorav
161
Voted
DOCENG
2008
ACM
15 years 3 months ago
A concise XML binding framework facilitates practical object-oriented document engineering
Semantic web researchers tend to assume that XML Schema and OWL-S are the correct means for representing the types, structure, and semantics of XML data used for documents and int...
Andruid Kerne, Zachary O. Toups, Blake Dworaczyk, ...
DOA
2000
102views more  DOA 2000»
15 years 3 months ago
Distributed Xbean Applications
XML has emerged as the universal standard for exchanging and externalizing data. Software products of all kinds are being upgraded to "support XML." Typically this means...
Bruce E. Martin