Sciweavers

135 search results - page 17 / 27
» On Implementing High Level Concurrency in Java
Sort
View
ESORICS
2000
Springer
15 years 3 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ICEIS
2009
IEEE
15 years 6 months ago
MIDAS: A Middleware for Information Systems with QoS Concerns
One of the most difficult tasks in the design of information systems is how to control the behaviour of the back-end storage engine, usually a relational database. As the load on t...
Luís Fernando Orleans, Geraldo Zimbrã...
CASES
2007
ACM
15 years 3 months ago
A self-maintained memory module supporting DMM
The memory intensive nature of object-oriented languages such as C++ and Java has created the need of a high-performance dynamic memory management (DMM); however, it is a challeng...
Weixing Ji, Feng Shi, Baojun Qiao
94
Voted
FCCM
2009
IEEE
190views VLSI» more  FCCM 2009»
15 years 6 months ago
Optical Flow on the Ambric Massively Parallel Processor Array (MPPA)
The Ambric Massively Parallel Processor Array (MPPA) is a device that contains 336 32-bit RISC processors and is appropriate for embedded systems due to its relatively small physi...
Brad L. Hutchings, Brent E. Nelson, Stephen West, ...
WOA
2003
15 years 1 months ago
An Integrated Resource Management Architecture for Wireless Smart Environments
— Pervasive and ubiquitous computing is enabling the implementation of “smart environments”, i.e., environments where applications support and enhance the abilities of their ...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi