Sciweavers

4190 search results - page 273 / 838
» Implementing commitment-based interactions
Sort
View
ISCA
1994
IEEE
123views Hardware» more  ISCA 1994»
15 years 8 months ago
Software-Extended Coherent Shared Memory: Performance and Cost
This paper evaluates the tradeoffs involved in the design of the software-extended memory system of Alewife, a multiprocessor architecturethat implements coherentsharedmemorythrou...
David Chaiken, Anant Agarwal
138
Voted
CBSE
2008
Springer
15 years 5 months ago
Experiences from Developing a Component Technology Agnostic Adaptation Framework
Systems are increasingly expected to adapt themselves to changing requirements and environmental situations with minimum user interactions. A challenge for self-adaptation is the i...
Eli Gjørven, Frank Eliassen, Romain Rouvoy
ACE
2003
86views Education» more  ACE 2003»
15 years 5 months ago
A New Approach to a First Year Undergraduate Information Systems Course
This paper describes the development, implementation and evaluation of a new teaching approach for a large first year undergraduate course in information systems at the University...
Denise Tolhurst, Bob Baker
CAV
2009
Springer
206views Hardware» more  CAV 2009»
16 years 4 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
SACMAT
2009
ACM
15 years 10 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger