Sciweavers

350 search results - page 64 / 70
» Improving application security with data flow assertions
Sort
View
POPL
2012
ACM
13 years 5 months ago
A compiler and run-time system for network programming languages
Software-defined networks (SDNs) are a new implementation architecture in which a controller machine manages a distributed collection of switches, by instructing them to install ...
Christopher Monsanto, Nate Foster, Rob Harrison, D...
DAC
2000
ACM
15 years 10 months ago
Code compression for low power embedded system design
erse approaches at all levels of abstraction starting from the physical level up to the system level. Experience shows that a highlevel method may have a larger impact since the de...
Haris Lekatsas, Jörg Henkel, Wayne Wolf
JBI
2010
212views Bioinformatics» more  JBI 2010»
14 years 4 months ago
Cloud computing: A new business paradigm for biomedical information sharing
We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called cloud computing. Clou...
Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Sta...
AFRICACRYPT
2010
Springer
15 years 4 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...
HPCA
2004
IEEE
15 years 10 months ago
Out-of-Order Commit Processors
Modern out-of-order processors tolerate long latency memory operations by supporting a large number of inflight instructions. This is particularly useful in numerical applications...
Adrián Cristal, Daniel Ortega, Josep Llosa,...