Sciweavers

9626 search results - page 1764 / 1926
» Invariant Based Programming
Sort
View
130
Voted
STOC
2004
ACM
138views Algorithms» more  STOC 2004»
15 years 8 months ago
Know thy neighbor's neighbor: the power of lookahead in randomized P2P networks
Several peer-to-peer networks are based upon randomized graph topologies that permit efficient greedy routing, e.g., randomized hypercubes, randomized Chord, skip-graphs and const...
Gurmeet Singh Manku, Moni Naor, Udi Wieder
115
Voted
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
15 years 7 months ago
Modeling Web Applications Using Java and XML Related Technologies
The purpose of this paper is to propose visual models for a web application using Java and XML related technologies. We consider a web application that uses 3tier architecture and...
Sam Chung, Yun Sik Lee
126
Voted
ICPP
2003
IEEE
15 years 7 months ago
A Hardware-based Cache Pollution Filtering Mechanism for Aggressive Prefetches
Aggressive hardware-based and software-based prefetch algorithms for hiding memory access latencies were proposed to bridge the gap of the expanding speed disparity between proces...
Xiaotong Zhuang, Hsien-Hsin S. Lee
SACMAT
2010
ACM
15 years 7 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
133
Voted
LCPC
2001
Springer
15 years 7 months ago
A Compilation Framework for Power and Energy Management on Mobile Computers
This paper discusses the potential benefits of applicationspecific power management through remote task execution. Power management is crucial for mobile devices that have to re...
Ulrich Kremer, Jamey Hicks, James M. Rehg
« Prev « First page 1764 / 1926 Last » Next »