Sciweavers

1234 search results - page 166 / 247
» Privacy-preserving Virtual Machine
Sort
View
100
Voted
CD
2004
Springer
15 years 9 months ago
On the Performance of SOAP in a Non-trivial Peer-to-Peer Experiment
Abstract. This paper reports on the experiences we gained while trying to build an interpreter for a new programming language aimed at developing strong mobile software. The interp...
Tom Van Cutsem, Stijn Mostinckx, Wolfgang De Meute...
113
Voted
LCPC
2004
Springer
15 years 9 months ago
The Use of Traces for Inlining in Java Programs
We explore the effectiveness of using traces in optimization. We build a trace collection system for the Jikes Research Virtual Machine and create traces based on the execution of...
Borys J. Bradel, Tarek S. Abdelrahman
183
Voted
WAC
2004
Springer
150views Communications» more  WAC 2004»
15 years 9 months ago
A Systems Architecture for Sensor Networks Based On Hardware/Software Co-design
We describe the motivation and design of a novel embedded systems architecture for large networks of small devices, tha canonical example being wireless sensor networks. The archit...
Andy Nisbet, Simon Dobson
127
Voted
ECBS
2003
IEEE
145views Hardware» more  ECBS 2003»
15 years 9 months ago
Model Checking and Evidence Exploration
We present an algebraic framework for evidence exploration: the process of interpreting, manipulating, and navigating the proof structure or evidence produced by a model checker w...
Yifei Dong, C. R. Ramakrishnan, Scott A. Smolka
115
Voted
WSTFEUS
2003
IEEE
15 years 9 months ago
Requirements for a Component Framework of Future Ubiquitous Computing
System software for future computing environments becomes more complex and heterogeneous. Portability becomes one of the important properties of the future system software. Compon...
Hiroo Ishikawa, Yuuki Ogata, Kazuto Adachi, Tatsuo...