Sciweavers

1234 search results - page 207 / 247
» Privacy-preserving Virtual Machine
Sort
View
AICT
2006
IEEE
123views Communications» more  AICT 2006»
15 years 3 months ago
Issues related to Development of Wireless Peer-to-Peer Games in J2ME
This paper describes and discusses challenges related to development of peer-to-peer games in J2ME using the available Bluetooth API (JSR82). By using Bluetooth on wireless device...
Alf Inge Wang, Michael Sars Norum, Carl-Henrik Wol...
APLAS
2004
ACM
15 years 3 months ago
McJava - A Design and Implementation of Java with Mixin-Types
A programming construct mixin was invented to implement uniform extensions and modifications to classes. Although mixin-based programming has been extensively studied both on the m...
Tetsuo Kamina, Tetsuo Tamai
CGO
2004
IEEE
15 years 3 months ago
Using Dynamic Binary Translation to Fuse Dependent Instructions
Instruction scheduling hardware can be simplified and easily pipelined if pairs of dependent instructions are fused so they share a single instruction scheduling slot. We study an...
Shiliang Hu, James E. Smith
ATAL
2006
Springer
15 years 3 months ago
ActorNet: an actor platform for wireless sensor networks
We present actorNet, a mobile agent platform for wireless sensor networks (WSNs). WSNs are well-suited to multiagent systems: agent autonomy reduces the need for communication, sa...
YoungMin Kwon, Sameer Sundresh, Kirill Mechitov, G...
FATES
2006
Springer
15 years 3 months ago
Goldilocks: Efficiently Computing the Happens-Before Relation Using Locksets
We present a new lockset-based algorithm, Goldilocks, for precisely computing the happens-before relation and thereby detecting data-races at runtime. Dynamic race detection algori...
Tayfun Elmas, Shaz Qadeer, Serdar Tasiran