Sciweavers

1528 search results - page 102 / 306
» Implementing Generalized Operator Overloading
Sort
View
ASPLOS
2006
ACM
15 years 8 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
MMM
2005
Springer
115views Multimedia» more  MMM 2005»
15 years 8 months ago
Interoperability and Multimedia Archives
In distributed computing systems, it is unwise to move data to the point of program code, but instead process data at the point of storage. This concept is even more appropriate t...
Dalen Kambur, Damir Becarevic, Mark Roantree
101
Voted
SC
2004
ACM
15 years 8 months ago
Analysis and Performance Results of a Molecular Modeling Application on Merrimac
The Merrimac supercomputer uses stream processors and a highradix network to achieve high performance at low cost and low power. The stream architecture matches the capabilities o...
Mattan Erez, Jung Ho Ahn, Ankit Garg, William J. D...
EUROSYS
2010
ACM
15 years 7 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
ISSS
2002
IEEE
103views Hardware» more  ISSS 2002»
15 years 7 months ago
A Symbolic Approach for the Combined Solution of Scheduling and Allocation
Scheduling is widely recognized as a very important step in highlevel synthesis. Nevertheless, it is usually done without taking into account the effects on the actual hardware im...
Luciano Lavagno, Mihai T. Lazarescu, Stefano Quer,...