Sciweavers

668 search results - page 72 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
ICISS
2009
Springer
14 years 7 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
PERCOM
2010
ACM
14 years 4 months ago
Detecting activities from body-worn accelerometers via instance-based algorithms
The automatic and unobtrusive identification of user's activities is one of the challenging goals of context-aware computing. This paper discusses and experimentally evaluate...
Nicola Bicocchi, Marco Mamei, Franco Zambonelli
IPPS
2002
IEEE
15 years 2 months ago
Java Mirrors: Building Blocks for Remote Interaction
Java mirror objects are building blocks for integrating web-based with high performance applications. This paper demonstrates the utility of mirror objects for construction of rem...
Yuan Chen, Karsten Schwan, David W. Rosen
AOSD
2008
ACM
14 years 11 months ago
Modularity first: a case for mixing AOP and attribute grammars
We have reimplemented the frontend of the extensible AspectBench Compiler for AspectJ, using the aspect-oriented meta-compiler JastAdd. The original frontend was purely object-ori...
Pavel Avgustinov, Torbjörn Ekman, Julian Tibb...
ENTCS
2007
116views more  ENTCS 2007»
14 years 9 months ago
Experiments in Cost Analysis of Java Bytecode
Recently, we proposed a general framework for the cost analysis of Java bytecode which can be used for measuring resource usage. This analysis generates, at compile-time, cost rel...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...