Sciweavers

1060 search results - page 173 / 212
» Mechanized semantics
Sort
View
DSN
2002
IEEE
15 years 2 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
ICMT
2010
Springer
15 years 2 months ago
Surviving the Heterogeneity Jungle with Composite Mapping Operators
Abstract. Model transformations play a key role in the vision of Modelngineering. Nevertheless, mechanisms like abstraction, variation and composition for specifying and applying r...
Manuel Wimmer, Gerti Kappel, Angelika Kusel, Werne...
COLCOM
2009
IEEE
15 years 2 months ago
Toward synchronization between decentralized orchestrations of composite web services
—Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation poin...
Walid Fdhila, Claude Godart
ICDCS
2000
IEEE
15 years 2 months ago
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
The increasing popularity and diversity of collaborative applications prompts a need for highly secure and reliable communication platforms for dynamic peer groups. Security mecha...
Jonathan Robert Stanton, Yair Amir, Damian Hasse, ...
MICRO
2000
IEEE
133views Hardware» more  MICRO 2000»
15 years 2 months ago
Compiler controlled value prediction using branch predictor based confidence
Value prediction breaks data dependencies in a program thereby creating instruction level parallelism that can increase program performance. Hardware based value prediction techni...
Eric Larson, Todd M. Austin