Sciweavers

1569 search results - page 219 / 314
» Programming contest strategy
Sort
View
97
Voted
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
15 years 4 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
97
Voted
ICALP
2010
Springer
15 years 4 months ago
Energy Parity Games
Energy parity games are infinite two-player turn-based games played on weighted graphs. The objective of the game combines a (qualitative) parity condition with the (quantitative)...
Krishnendu Chatterjee, Laurent Doyen
ECOOP
2007
Springer
15 years 4 months ago
AS-GC: An Efficient Generational Garbage Collector for Java Application Servers
Abstract. A generational collection strategy utilizing a single nursery cannot efficiently manage objects in application servers due to variance in their lifespans. In this paper, ...
Feng Xian, Witawas Srisa-an, ChengHuan Jia, Hong J...
104
Voted
JMLC
2000
Springer
15 years 4 months ago
Composable Message Semantics in Oberon
Most object-oriented languages offer a limited number of invocation semantics. At best, they define a default mode of synchronous invocation, plus some keywords to express addition...
Markus Hof
92
Voted
TIC
2000
Springer
110views System Software» more  TIC 2000»
15 years 4 months ago
Safe and Flexible Dynamic Linking of Native Code
Abstract. We present the design and implementation of the first complete framework for flexible and safe dynamic linking of native code. Our approach extends Typed Assembly Languag...
Michael W. Hicks, Stephanie Weirich, Karl Crary