Sciweavers

2111 search results - page 258 / 423
» How to Program Pervasive Systems
Sort
View
141
Voted
SIGCSE
2000
ACM
193views Education» more  SIGCSE 2000»
15 years 7 months ago
Experimentation with bounded buffer synchronization
Undergraduates are usually introduced to synchronization in operating systems through a discussion of classical problems such as reader-writer or producers-consumers. The traditio...
Steven Robbins
156
Voted
SAS
1993
Springer
139views Formal Methods» more  SAS 1993»
15 years 7 months ago
Compiling FX on the CM-2
Type and effect systems provide a safe and effective means of programming high-performance parallel computers with a high-level language that integrates both functional and impe...
Jean-Pierre Talpin, Pierre Jouvelot
141
Voted
ENTCS
2008
116views more  ENTCS 2008»
15 years 3 months ago
Computational Origami Construction as Constraint Solving and Rewriting
Computational origami is the computer assisted study of mathematical and computational aspects of origami. An origami is constructed by a finite sequence of fold steps, each consi...
Tetsuo Ida, Mircea Marin, Hidekazu Takahashi, Fado...
126
Voted
IFIPTM
2010
97views Management» more  IFIPTM 2010»
15 years 2 months ago
Securing Class Initialization
Abstract. Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progre...
Keiko Nakata, Andrei Sabelfeld
113
Voted
CSFW
2006
IEEE
15 years 9 months ago
Decentralized Robustness
Robustness links confidentiality and integrity properties of a computing system and has been identified as a useful property for characterizing and enforcing security. Previous ...
Stephen Chong, Andrew C. Myers