Sciweavers

5790 search results - page 650 / 1158
» Distributed programming with distributed authorization
Sort
View
IPPS
1999
IEEE
15 years 8 months ago
Mechanical Verification of a Garbage Collector
Abstract. We describe how the PVS verification system has been used to verify a safety property of a garbage collection algorithm, originally suggested by Ben-Ari. The safety prope...
Klaus Havelund
IPPS
1999
IEEE
15 years 8 months ago
Marshaling/Demarshaling as a Compilation/Interpretation Process
Marshaling is the process through which structured values are serialized into a stream of bytes; demarshaling converts this stream of bytes back to structured values. Most often, ...
Christian Queinnec
COMPSAC
1998
IEEE
15 years 8 months ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi
ICS
1999
Tsinghua U.
15 years 8 months ago
Clustered speculative multithreaded processors
In this paper we present a processor microarchitecture that can simultaneously execute multiple threads and has a clustered design for scalability purposes. A main feature of the ...
Pedro Marcuello, Antonio González
ICS
1999
Tsinghua U.
15 years 8 months ago
Improving the performance of speculatively parallel applications on the Hydra CMP
Hydra is a chip multiprocessor (CMP) with integrated support for thread-level speculation. Thread-level speculation provides a way to parallelize sequential programs without the n...
Kunle Olukotun, Lance Hammond, Mark Willey