Sciweavers

1135 search results - page 96 / 227
» On Performance of Delegation in Java
Sort
View
CCS
2010
ACM
15 years 4 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
IWPC
2009
IEEE
15 years 10 months ago
Practical static analysis for inference of security-related program properties
We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...
Yin Liu, Ana Milanova
IPPS
2005
IEEE
15 years 9 months ago
A Comparison of MPI and Process Networks
The Message Passing Interface (MPI) is a popular communication library that supports the SIMD model of parallel computing. Process networks (PN), where processes communicate throu...
Thomas M. Parks
ENTCS
2007
95views more  ENTCS 2007»
15 years 4 months ago
MMC: the Mono Model Checker
The Mono Model Checker (mmc) is a software model checker for cil bytecode programs. mmc has been developed on the Mono platform. mmc is able to detect deadlocks and assertion viol...
Theo C. Ruys, Niels H. M. Aan de Brugh
ASPLOS
1996
ACM
15 years 8 months ago
The Structure and Performance of Interpreters
Interpreted languages have become increasingly popular due to demands for rapid program development, ease of use, portability, and safety. Beyond the general impression that they ...
Theodore H. Romer, Dennis Lee, Geoffrey M. Voelker...