Sciweavers

1663 search results - page 287 / 333
» Privacy and Identity Management
Sort
View
P2PKM
2004
15 years 1 months ago
Merging G-Grid P2P Systems While Preserving Their Autonomy
Peer-to-Peer (P2P) systems share and manage huge amounts of data and resources distributed across a large number of machines. In pure P2P environments the control is totally decent...
Gianluca Moro, Gabriele Monti, Aris M. Ouksel
HASKELL
2008
ACM
15 years 27 days ago
Lightweight monadic regions
We present Haskell libraries that statically ensure the safe use of resources such as file handles. We statically prevent accessing an already closed handle or forgetting to clos...
Oleg Kiselyov, Chung-chieh Shan
GRID
2006
Springer
14 years 12 months ago
Providing Portlet-Based Client Access to CIMA-Enabled Crystallographic Instruments, Sensors, and Data
The Common Instrument Middleware Architecture (CIMA) project, supported by the NSF Middleware Initiative, aims at making scientific instruments and sensors remotely accessible by ...
Hao Yin, Donald F. McMullen, Mehmet A. Nacar, Marl...
SIGPLAN
2008
14 years 11 months ago
Some thoughts on teaching programming and programming languages
It is argued that the teaching of programming is central to the education of skilled computer professionals, that the teaching of programming languages is central to the teaching ...
John C. Reynolds
OOPSLA
2004
Springer
15 years 5 months ago
Hard real-time: C++ versus RTSJ
In the domain of hard real-time systems, which language is better: C++ or the Real-Time Specification for Java (RTSJ)? Although standard Java provides a more productive programmin...
Daniel L. Dvorak, William K. Reinholtz