Sciweavers

8068 search results - page 196 / 1614
» Java Data Objects
Sort
View
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
15 years 8 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
KIVS
1999
Springer
15 years 7 months ago
Mobile Agents as an Architectural Concept for Internet-Based Distributed Applications - The WASP Project Approach
Abstract. After introducing the concept of mobile agents and potential application domains, we motivate why mobile agent technology is an interesting concept for large Internet-bas...
Stefan Fünfrocken, Friedemann Mattern
FOCS
2005
IEEE
15 years 8 months ago
Linear Lower Bounds on Real-World Implementations of Concurrent Objects
This paper proves   ¡ £ ¥ lower bounds on the time to perform a single instance of an operation in any implementation of a large class of data structures shared by £ processe...
Faith Ellen Fich, Danny Hendler, Nir Shavit
CADE
2005
Springer
16 years 3 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
GD
1998
Springer
15 years 7 months ago
Algorithmic Patterns for Orthogonal Graph Drawing
Abstract. In this paper, we present an object-oriented design and implementation of the core steps of the giotto algorithm for orthogonal graph drawing. Our design is motivated by ...
Natasha Gelfand, Roberto Tamassia