Sciweavers

2015 search results - page 165 / 403
» Hidden Software Capabilities
Sort
View
85
Voted
EUROSYS
2007
ACM
15 years 10 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
VMCAI
2009
Springer
15 years 7 months ago
Model-Checking the Linux Virtual File System
This paper presents a case study in modelling and verifying the Linux Virtual File System (VFS). Our work is set in the context of Hoare’s verification grand challenge and, in p...
Andy Galloway, Gerald Lüttgen, Jan Tobias M&u...
134
Voted
INTENSIVE
2009
IEEE
15 years 7 months ago
Accelerating K-Means on the Graphics Processor via CUDA
In this paper an optimized k-means implementation on the graphics processing unit (GPU) is presented. NVIDIA’s Compute Unified Device Architecture (CUDA), available from the G8...
Mario Zechner, Michael Granitzer
94
Voted
XPU
2009
Springer
15 years 7 months ago
Using Digital Tabletops to Support Distributed Agile Planning Meetings
Digital tabletop is an emerging technology that is being increasingly used to support group activities. Agile Planner for Digital Tabletops (APDT) is a tool that was built to suppo...
Xin Wang, Yaser Ghanam, Shelly Park, Frank Maurer
92
Voted
ERLANG
2009
ACM
15 years 7 months ago
Cleaning up Erlang code is a dirty job but somebody's gotta do it
This paper describes opportunities for automatically modernizing Erlang applications, cleaning them up, eliminating certain bad smells from their code and occasionally also improv...
Thanassis Avgerinos, Konstantinos F. Sagonas