Sciweavers

2111 search results - page 22 / 423
» How to Program Pervasive Systems
Sort
View
111
Voted
JLP
2007
98views more  JLP 2007»
15 years 9 days ago
Tempus fugit: How to plug it
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of thi...
Alessandra Di Pierro, Chris Hankin, Igor Siveroni,...
100
Voted
OOPSLA
1993
Springer
15 years 4 months ago
How to Get a Paper Accepted at OOPSLA (Panel)
iam Pugh. Advice to authors of extended abstracts. http://www.acm.org/sigplan/conferences/author-info/pughadvice.html. [7] Mary Shaw. Writing good software engineering research pap...
Ralph E. Johnson, Kent Beck, Grady Booch, William ...
PPOPP
2009
ACM
15 years 5 months ago
Turbocharging boosted transactions or: how i learnt to stop worrying and love longer transactions
Boosted transactions offer an attractive method that enables programmers to create larger transactions that scale well and offer deadlock-free guarantees. However, as boosted tran...
Chinmay Eishan Kulkarni, Osman S. Unsal, Adri&aacu...
92
Voted
SODA
2003
ACM
122views Algorithms» more  SODA 2003»
15 years 1 months ago
Certifying and repairing solutions to large LPs how good are LP-solvers?
State-of-the-art linear programming (LP) solvers give solutions without any warranty. Solutions are not guaranteed to be optimal or even close to optimal. Of course, it is general...
Marcel Dhiflaoui, Stefan Funke, Carsten Kwappik, K...
97
Voted
AIED
2009
Springer
15 years 7 months ago
From Conceptual Models to Agent-based Simulations: Why and How
The core problem we address in this paper is how to take a declarative conceptual representation of a complex system and produce an agent-based simulation of that model. In particu...
Swaroop Vattam, Ashok K. Goel, Spencer Rugaber, Ci...