Sciweavers

2978 search results - page 363 / 596
» Operations Research
Sort
View
ACMMSP
2006
ACM
257views Hardware» more  ACMMSP 2006»
15 years 10 months ago
Memory models for open-nested transactions
Open nesting provides a loophole in the strict model of atomic transactions. Moss and Hosking suggested adapting open nesting for transactional memory, and Moss and a group at Sta...
Kunal Agrawal, Charles E. Leiserson, Jim Sukha
PDCN
2007
15 years 5 months ago
An information service infrastructure for ambient networks
Communication environments are becoming increasingly more complex due to the diversity of available network technologies in terms of spatial coverage and design characteristics, a...
Raffaele Giaffreda, Kostas Pentikousis, Eleanor He...
DS
2001
158views Database» more  DS 2001»
15 years 5 months ago
Towards A Semantic Framework for Service Description
The rapid development of the Internet and of distributed computing has led to a proliferation of online service providers such as digital libraries, web information sources, electr...
Marlon Dumas, Justin O'Sullivan, Mitra Heravizadeh...
SADFE
2008
IEEE
15 years 10 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
141
Voted
GCSE
1999
Springer
15 years 8 months ago
Scoping Constructs for Software Generators
Abstract. A well-known problem in program generation is scoping. When identifiers (i.e., symbolic names) are used to refer to variables, types, or functions, program generators mu...
Yannis Smaragdakis, Don S. Batory