Sciweavers

5790 search results - page 878 / 1158
» Distributed programming with distributed authorization
Sort
View
122
Voted
ICPP
2002
IEEE
15 years 7 months ago
Out-of-Order Instruction Fetch Using Multiple Sequencers
Conventional instruction fetch mechanisms fetch contiguous blocks of instructions in each cycle. They are difficult to scale since taken branches make it hard to increase the siz...
Paramjit S. Oberoi, Gurindar S. Sohi
203
Voted
EUROPAR
2001
Springer
15 years 7 months ago
Load Redundancy Elimination on Executable Code
Optimizations performed at link time or directly applied to nal program executables have received increased attention in recent years. This paper discuss the discovery and elimina...
Manel Fernández, Roger Espasa, Saumya K. De...
ICALP
2001
Springer
15 years 7 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
ICSE
2001
IEEE-ACM
15 years 7 months ago
Composition Patterns: An Approach to Designing Reusable Aspects
Requirements such as distribution or tracing have an impact on multiple classes in a system. They are cross-cutting requirements, or aspects. Their support is, by necessity, scatt...
Siobhán Clarke, Robert J. Walker
SCCC
1999
IEEE
15 years 6 months ago
Safe-Threads: A New Model for Object-Oriented Multi-Threaded Languages
Threads have been present in programming languages for some time now. However, they have a bad image among software developers because they lead to unreliable applications. Most o...
Luis Mateu, José M. Piquer