Sciweavers

8087 search results - page 1355 / 1618
» Meta Data Management
Sort
View
PLDI
2009
ACM
15 years 11 months ago
GC assertions: using the garbage collector to check heap properties
This paper introduces GC assertions, a system interface that programmers can use to check for errors, such as data structure invariant violations, and to diagnose performance prob...
Edward Aftandilian, Samuel Z. Guyer
SAC
2009
ACM
15 years 11 months ago
Applying Reo to service coordination in long-running business transactions
Ensuring transactional behavior of business processes and web service compositions is an essential issue in the area of serviceoriented computing. Transactions in this context may ...
Natallia Kokash, Farhad Arbab
SAC
2009
ACM
15 years 11 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
138
Voted
HIPEAC
2009
Springer
15 years 11 months ago
Mapping and Synchronizing Streaming Applications on Cell Processors
Developing streaming applications on heterogenous multi-processor architectures like the Cell is difficult. Currently, application developers need to know about hardware details t...
Maik Nijhuis, Herbert Bos, Henri E. Bal, Cé...
PERVASIVE
2009
Springer
15 years 11 months ago
Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker
Research has demonstrated that information workers often manage several different computing devices in an effort to balance convenience, mobility, input efficiency, and content rea...
Amy K. Karlson, Brian Meyers, Andy Jacobs, Paul Jo...
« Prev « First page 1355 / 1618 Last » Next »