Sciweavers

685 search results - page 61 / 137
» Implementing Controlled Languages in GF
Sort
View
CORR
2011
Springer
181views Education» more  CORR 2011»
14 years 1 months ago
Garbage Collection for Multicore NUMA Machines
Modern high-end machines feature multiple processor packages, each of which contains multiple independent cores and integrated memory controllers connected directly to dedicated p...
Sven Auhagen, Lars Bergstrom, Matthew Fluet, John ...
SACMAT
2010
ACM
15 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
CARDIS
2000
Springer
107views Hardware» more  CARDIS 2000»
15 years 2 months ago
JCCap: Capability-based Access Control for Java Card
: This paper describes JCCap, a protection facility for cooperating applications in the context of Java Card. It enables the control of access rights between mutually suspicious ap...
Daniel Hagimont, Jean-Jacques Vandewalle
LCTRTS
2007
Springer
15 years 4 months ago
Tetris: a new register pressure control technique for VLIW processors
The run-time performance of VLIW (very long instruction word) microprocessors depends heavily on the effectiveness of its associated optimizing compiler. Typical VLIW compiler pha...
Weifeng Xu, Russell Tessier
CHI
2008
ACM
15 years 10 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...