Sciweavers

505 search results - page 42 / 101
» Implementation of Belief Change Operators Using BDDs
Sort
View
133
Voted
IPPS
2009
IEEE
15 years 10 months ago
Using a market economy to provision compute resources across planet-wide clusters
—We present a practical, market-based solution to the resource provisioning problem in a set of heterogeneous resource clusters. We focus on provisioning rather than immediate sc...
Murray Stokely, Jim Winget, E. Keyes, C. Grimes, B...
166
Voted
TLDI
2010
ACM
198views Formal Methods» more  TLDI 2010»
15 years 3 months ago
Verifying event-driven programs using ramified frame properties
Interactive programs, such as GUIs or spreadsheets, often maintain dependency information over dynamically-created networks of objects. That is, each imperative object tracks not ...
Neel R. Krishnaswami, Lars Birkedal, Jonathan Aldr...
156
Voted
EUROMICRO
2006
IEEE
15 years 7 months ago
Building Reconfigurable Component-Based OS with THINK
Dynamic reconfiguration allows modifying a system during its execution, and can be used to apply patches and updates, to implement adaptive systems, dynamic instrumentation, or to...
Juraj Polakovic, Ali Erdem Özcan, Jean-Bernar...
119
Voted
OSDI
2000
ACM
15 years 4 months ago
Policies for Dynamic Clock Scheduling
Pocket computers are beginning to emerge that provide sufficient processing capability and memory capacity to run traditional desktop applications and operating systems on them. T...
Dirk Grunwald, Philip Levis, Keith I. Farkas, Char...
DRM
2007
Springer
15 years 9 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen