Sciweavers

27119 search results - page 5371 / 5424
» Languages
Sort
View
TOCS
2008
154views more  TOCS 2008»
14 years 9 months ago
Adaptive work-stealing with parallelism feedback
We present an adaptive work-stealing thread scheduler, ASTEAL, for fork-join multithreaded jobs, like those written using the Cilk multithreaded language or the Hood work-stealing...
Kunal Agrawal, Charles E. Leiserson, Yuxiong He, W...
CE
2005
170views more  CE 2005»
14 years 9 months ago
Development of an environmental virtual field laboratory
Laboratory exercises, field observations and field trips are a fundamental part of many earth science and environmental science courses. Field observations and field trips can be ...
V. Ramasundaram, S. Grunwald, A. Mangeot, N. B. Co...
TOPLAS
2008
138views more  TOPLAS 2008»
14 years 9 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
TOSEM
2008
168views more  TOSEM 2008»
14 years 9 months ago
Developing and debugging algebraic specifications for Java classes
Modern programs make extensive use of reusable software libraries. For example, a study of a number of large Java applications shows that between 17% and 30% of the classes in tho...
Johannes Henkel, Christoph Reichenbach, Amer Diwan
TSE
2008
236views more  TSE 2008»
14 years 9 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...
« Prev « First page 5371 / 5424 Last » Next »