Sciweavers

686 search results - page 24 / 138
» Foundations for Bidirectional Programming
Sort
View
CSFW
2009
IEEE
15 years 4 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
PLDI
1993
ACM
15 years 1 months ago
Lifetime-Sensitive Modulo Scheduling
This paper shows how to software pipeline a loop for minimal register pressure withoutsacrificing the loop’s minimum execution time. This novel bidirectional slack-scheduling m...
Richard A. Huff
WOA
2000
14 years 11 months ago
Calculi for Network Aware Programming
ogramming are evaluated along three different guidelines: the programming abstractions the calculus suggests; the underlying programming model; the security mechanisms provided. Th...
Gian Luigi Ferrari, Rosario Pugliese, Emilio Tuost...
STOC
2005
ACM
156views Algorithms» more  STOC 2005»
15 years 10 months ago
Convex programming for scheduling unrelated parallel machines
We consider the classical problem of scheduling parallel unrelated machines. Each job is to be processed by exactly one machine. Processing job j on machine i requires time pij . ...
Yossi Azar, Amir Epstein
ECOOP
2000
Springer
15 years 2 months ago
Empirical Study of Object-Layout Strategies and Optimization Techniques
Althoughthereisalargebodyofresearchonthetimeoverheadofobject oriented programs, there is little work on memory overhead. This paper takes an empirical approach to the study of this...
Natalie Eckel, Joseph Gil