Sciweavers

64 search results - page 9 / 13
» Fences in Weak Memory Models
Sort
View
ENTCS
2007
97views more  ENTCS 2007»
14 years 9 months ago
An Operational Semantics for Shared Messaging Communication
Shared Messaging Communication (SMC) has been introduced in [9] as a model of communication which reduces communication costs (both in terms of communication latency and memory us...
Astrid Kiehn
FIDJI
2004
Springer
15 years 2 months ago
A JMM-Faithful Non-interference Calculus for Java
We present a calculus for establishing non-interference of several Java threads running in parallel. The proof system is built atop an implemented sequential Java Dynamic Logic cal...
Vladimir Klebanov
SAC
2004
ACM
15 years 2 months ago
Caching in Web memory hierarchies
Web cache replacement algorithms have received a lot of attention during the past years. Though none of the proposed algorithms deals efficiently with all the particularities of t...
Dimitrios Katsaros, Yannis Manolopoulos
SCHOLARPEDIA
2008
73views more  SCHOLARPEDIA 2008»
14 years 8 months ago
Multiple drafts model
In his book "Consciousness Explained"[2], Daniel Dennett explores some of what he perceives are the weaknesses in current models of cognition, and tries to provide an alt...
Daniel Dennett, Kathleen Akins
TISSEC
2008
106views more  TISSEC 2008»
14 years 9 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe