Sciweavers

5548 search results - page 292 / 1110
» Programming a Distributed System Using Shared Objects
Sort
View
ESOP
2010
Springer
15 years 9 months ago
Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions
Abstract. The hiding of internal invariants creates a mismatch between procedure specifications in an interface and proof obligations on the implementations of those procedures. T...
David A. Naumann, Anindya Banerjee
SPAA
2010
ACM
15 years 9 months ago
Towards optimizing energy costs of algorithms for shared memory architectures
Energy consumption by computer systems has emerged as an important concern. However, the energy consumed in executing an algorithm cannot be inferred from its performance alone: i...
Vijay Anand Korthikanti, Gul Agha
IRI
2007
IEEE
15 years 10 months ago
An Object-Oriented Approach for High Availability of Applications Integration
The integration of networked applications, especially those requiring continuous access to shared information resources and databases, may be effected by scheduled unavailability ...
Jameela Al-Jaroodi, Nader Mohamed
KBSE
2005
IEEE
15 years 10 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
PPOPP
1990
ACM
15 years 8 months ago
Concurrent Aggregates (CA)
Toprogrammassivelyconcurrent MIMDmachines, programmersneed tools for managingcomplexity. One important tool that has been used in the sequential programmingworld is hierarchies of...
Andrew A. Chien, William J. Dally